summaryrefslogtreecommitdiffstats
path: root/debian/perl-framework/t/security/CVE-2004-0942.t
blob: 9810480aaa812f1ba796619d27c0c172a87c4e8b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
use strict;
use warnings FATAL => 'all';

use Apache::Test;
use Apache::TestUtil;
use Apache::TestRequest;

$SIG{PIPE} = 'IGNORE';

plan tests => 2, need_min_apache_version('2.0');

my $sock = Apache::TestRequest::vhost_socket('default');
ok $sock;

# This is a test for CAN-2004-0942 albeit a pretty bad one:
# CAN-2004-0942 is a memory leak in the <=2.0.52 logic for handling
# whitespace in folded headers.  This test tests that a folded header
# which, including whitespace, exceeds the field length limit, gets a
# 400 response.  A better httpd implementation could handle such
# headers without the memory leak, yet would fail this test.

Apache::TestRequest::socket_trace($sock);

$sock->print("GET /index.html HTTP/1.0\r\n");

my $n = $sock->print("Hello:\r\n");
foreach (1..100) {
    $n = $sock->print(" "x500 . "\r\n") if $sock->connected;
}

$sock->print("\r\n") if $sock->connected;

my $line = Apache::TestRequest::getline($sock) || '';

ok t_cmp($line, qr{^HTTP/1\.. 400}, "request was refused");