I am not certain if this is the exploit you are talking about. There was no link included in the email which you
There was a CERT Advisrory issued on that this morming: CERT Advisory CA-2002-17 Apache Web Server Chunk Handling Vulnerability
The vulnerability is described in detail on the Apache site: http://httpd.apache.org/info/security_bulletin_20020617.txt
It seems that the bug is not exploitable on Linux, but I haven't found a clear statement what this is concerned.
Perhaps Roman could comment on that. I'm CC'ing him just in case he is to busy to read the list at the moment...
A part of the stack gets overwritten. Regardless of the fact that you
might now be able to overwrite the return address of the function that you
live in with data that you can control, you might be able to overwrite
other "sensitive" parts (or other return addresses). By consequence, the
possible exploit scenario might become somewhat tricky, but speculations
about whether it is exploitable to execute syscalls (or alike) or not are
purely academic at this stage.
There will be an official announcement from our side as soon as possible,
of course. We hope to be ready later today.
Roman.
--
- -
| Roman Drahtmüller