Hi

Dne Mon, 29 Jun 2009 13:39:19 +0200
Thijs Kinkhorst <th...@debian.org> napsal(a):

> Right, but the reporter is basing his report on the presence of log lines 
> trying to exploit the original issue. Which should not be possible anymore.

No, in the log, he is using exploited config file (with some custom
code inside).

-- 
        Michal Čihař | http://cihar.com | http://blog.cihar.com

Attachment: signature.asc
Description: PGP signature

Reply via email to