On Wed Jun 19 17:54:02 2002 +0400 Igor Sysoev wrote:
On 19 Jun 2002, Ilya Martynov wrote:
If you still do not know about it:
http://httpd.apache.org/info/security_bulletin_20020617.txt
Now mod_perl question. mod_perl servers often are used as backend
servers. I.e. they are not
On Thu, 20 Jun 2002, Lupe Christoph wrote:
On Thursday, 2002-06-20 at 18:22:10 +0400, Igor Sysoev wrote:
On Thu, 20 Jun 2002, Lupe Christoph wrote:
and the mod_perl module seems to prevent the crash:
telnet proxy.customer.de 80
Trying 213.155.64.138...
Connected to
On Fri, 21 Jun 2002, Richard [utf-8] Čepas wrote:
On Wed Jun 19 17:54:02 2002 +0400 Igor Sysoev wrote:
On 19 Jun 2002, Ilya Martynov wrote:
If you still do not know about it:
http://httpd.apache.org/info/security_bulletin_20020617.txt
Now mod_perl question. mod_perl servers
On Wed, 19 Jun 2002, dreamwvr wrote:
my comments FWIW
This means thus far does not impact as_seriously little endian NIX
based architectures. The reason being? That Apache spawns a pool of
child processes to serve requests. Therefore a DoS kills the child serving
[...]
This doesn't make
On Fri, 21 Jun 2002, Ask Bjoern Hansen wrote:
On Thu, 20 Jun 2002, Lupe Christoph wrote:
[...]
Sorry that is not the answer to my question - the question is if my
code gets a chance to do *anything*, or will the httpd code just
crash at a later time? It does not crash like a
On Fri, Jun 21, 2002 at 05:31:00AM -0700, Ask Bjoern Hansen wrote:
On Wed, 19 Jun 2002, dreamwvr wrote:
my comments FWIW
This means thus far does not impact as_seriously little endian NIX
based architectures. The reason being? That Apache spawns a pool of
child processes to serve
June 21, 2002
High Risk Apache Exploit Circulating
By Ryan Naraine
The Apache Foundation has issued a
warning that exploits to its chunk
handling vulnerability are circulating
on the Internet, putting users of its
open-source server at high risk.
The vulnerability, which Apache now
says
On Fri, Jun 21, 2002 at 05:31:00AM -0700, Ask Bjoern Hansen wrote:
64bit binaries are exploitable. There are also exploits for several
32bit systems.
Does anyone know if Red Hat Linux 7.2 on i686 is vulnerable to the
remote shell (not the DoS) exploit?
On Fri, 21 Jun 2002 14:06:45 -0400, Philip Mak [EMAIL PROTECTED] said:
PM On Fri, Jun 21, 2002 at 05:31:00AM -0700, Ask Bjoern Hansen wrote:
64bit binaries are exploitable. There are also exploits for several
32bit systems.
PM Does anyone know if Red Hat Linux 7.2 on i686 is vulnerable to
At 20:06 21.06.2002, Philip Mak wrote:
On Fri, Jun 21, 2002 at 05:31:00AM -0700, Ask Bjoern Hansen wrote:
64bit binaries are exploitable. There are also exploits for several
32bit systems.
Does anyone know if Red Hat Linux 7.2 on i686 is vulnerable to the
remote shell (not the DoS) exploit?
On Thursday, 2002-06-20 at 18:22:10 +0400, Igor Sysoev wrote:
On Thu, 20 Jun 2002, Lupe Christoph wrote:
and the mod_perl module seems to prevent the crash:
telnet proxy.customer.de 80
Trying 213.155.64.138...
Connected to proxy.customer.de.
Escape character is '^]'.
POST
11 matches
Mail list logo