Gobbles Releases Apache Exploit(OT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Gobbles Releases Apache Exploit By Brian McWilliams In a move aimed at showing up other security researchers, Gobbles Security on Wednesday released source code to a program that exploits a serious security flaw in the popular Apache Web server. http://online.securityfocus.com/news/493 - -- "...Linux, MS-DOS, and Windows 2000 (also known as the Good, the Bad, and the Ugly)." -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iEYEARECAAYFAj0uZAsACgkQeNJ3p8sZ/uuXpgCfY87sY3U39B9KbPkUgt5ESZ42 FqYAnAsQP8RSd8p8v0Lv1F+86B/6XHXg =ye3Z -----END PGP SIGNATURE-----
On Fri, Jul 12, 2002 at 01:07:23AM -0400, Fred A. Miller wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Gobbles Releases Apache Exploit By Brian McWilliams
In a move aimed at showing up other security researchers, Gobbles Security on Wednesday released source code to a program that exploits a serious security flaw in the popular Apache Web server.
I wish Fred looked at the date on that page before posting to the list and also refer to http://httpd.apache.org/info/security_bulletin_20020620.txt which explains the fix. SuSE addressed it in http://www.suse.com/de/support/security/2002_22_apache.html -Kastus
participants (2)
-
Fred A. Miller
-
Konstantin (Kastus) Shchuka