Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Sven 'Darkman' Michels (svendarkman.de)
Date: Thu Jun 20 2002 - 09:35:35 CDT
Bernie Seidenspinner wrote:
> it's not realy so. the first message say's there is a bug in apache an
> suse put the updatet package (1.3.19) on the server. after this moment a
> new info means all apache's inclusive apache 1.3.25 where exploitable.
Until now, the exploit is only avaiable for openbsd. Till a 'linux'
release it will take some time.
For 'Admins' who run Sites which are important/HA/whatever the rpm should
not be a real problem cause they should use own compiled servers ;)
All other ppl: will take some time till you'll get a 'target' for such attacks.
Maybe, it's a 'quick patch' to put a Proxy infront who can filter out
the Chunked request header (don't slap me if i'm wrong, just an idea ;)
> i think the suse packages are exploitable, because version 1.3.19, and
> the exploit can help us to find out this.
the released exploit for openbsd doesn't work against SuSE (7.3 here)
out of the box (with the defined targets), so it's not useable for
scriptkiddies (needs a little of brain ;)
So, calm down, drink coffe and let the suse-security team do a
good job (i'm sure they will.)
-- To unsubscribe, e-mail: suse-security-unsubscribesuse.com For additional commands, e-mail: suse-security-helpsuse.com Security-related bug reports go to securitysuse.de, not here