Subject: Re: www/apache*
To: Ignatios Souvatzis <ignatios@theory.cs.uni-bonn.de>
From: None <itojun@iijlab.net>
List: tech-pkg
Date: 06/18/2002 22:15:49
>> beware - www/apache* ARE NOT SECURE YET. we are still awaiting for
>> apache.org to issue a new release.
>doesn't the bad part (> denial-of-service) only apply to 64 bit architectures?
from CERT advisory, i'm not sure. (it doesn't say that 32bit arch
are safe)
itojun
II. Impact
For Apache versions 1.3 through 1.3.24 inclusive, this vulnerability
may allow the execution of arbitrary code by remote attackers. Several
sources have reported that this vulnerability can be used by intruders
to execute arbitrary code on Windows platforms. Additionally, the
Apache Software Foundation has reported that a similar attack may
allow the execution of arbitrary code on 64-bit UNIX systems.
For Apache versions 2.0 through 2.0.36 inclusive, the condition
causing the vulnerability is correctly detected and causes the child
process to exit. Depending on a variety of factors, including the
threading model supported by the vulnerable system, this may lead to a
denial-of-service attack against the Apache web server.