![]() |
ATTN: All Ded. server owners running Apache - new vulnerability
A new vulnerability has been discovered. It affects "1.3.24 and 2.0 up to and including 2.0.36 and 2.0.36-dev versions"
There's no patch/new version available yet, however they're working on it. You can read more here: http://httpd.apache.org/info/securit...n_20020617.txt |
Oh shit. Not good at all.
|
Those godamm hackerz :1orglaugh :1orglaugh
|
Good Heads up :thumbsup
|
the vulnerability appears to be only in the windows build (the only place i saw in the code where the function in question is called with a paramater other than a #define). i think we're safe.
|
:ak47: Windows
|
Its only in Windows, haha scared me there:1orglaugh
|
thank god for freebsd
|
Quote:
hehe, same here :thumbsup |
Quote:
|
Uhm.. not only in windows.. Granted, it's far more serious in windows. :)
It could be used as a DoS attack against your server, but that's not nearly as troublesome as a security vulnerability. No huge worries here, keeping an eye on things and ready to react if need be. Doubting anything will happen though. Guessing if some kiddie figures out a way to make this exploit work, you might see some higher-profile sites go down tonight or something for a while. Other than that, oh well. Much better than ANY of the IIS bugs. :) -Phil |
| All times are GMT -7. The time now is 09:53 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2026, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123