Oh yeah, I forgot to include this link, in case it happens to be the
case.. not that I would know, I dont use Interland...

https://www.redhat.com/advice/speaks_backport.html


On Sun, 15 Aug 2004, Liu Die Yu wrote:

> this message is only useful for INTERLAND users and spammers.
>
> INTERLAND is the most popular web hosting corporation online - even
> bigger than VERIO - according to 3rd-party survey. INTERLAND's default
> vps PROBABLY has REMOTE COMPROMISE vulnerability. "PROBABLY" means i
> just checked the version # of apache, but have not exploited it yet.
>
> when i was planning to run my webapp on INTERLAND's web server, i found
> the server is running apache.1.3.22 and php4.0.x. after checking
> security record at httpd.apache.org AND php.net, i found both apache and
> php contain serious vulnerabilities:
>
> the most serious problem is critical: apache1.3.22 contains REMOTE
> COMPROMISE vulnerability:
>     Apache Chunked encoding vulnerability  CVE-2002-0392
>
> i created support ticket in my account, and waited for about 36 hours,
> but no one responded. then i closed the ticket. it looks like the
> support staff don't care for remote compromise - or too busy to fix it.
> so INTERLAND users must download and install apache themselves.
>
> for demonstration purpose, the following INTERLAND websites are running
> apache1.3.22
> 209.203.227.116,  209.203.227.115, 209.203.227.114
> 209.203.227.117 is an exception - it's my web server with apache1.3.32
> and php5 :-))))
>
> Regards,
>
> Liu Die Yu
> http://umbrella.name/people/liu.dieyu/
>
> UMBRELLA.NAME
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to