Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Frank Steiner (fstinformatik.uni-kiel.de)
Date: Fri Jun 21 2002 - 03:21:49 CDT
Roman Drahtmueller wrote:
> Unless I see the exploit working, I don't believe it.
> This, however, does not have any influence on the severity of the bug: a
> _possible_ code execution vulnerability is just as bad as an evident code
> execution vulnerability.
so, would it mean much work to compile RPMs for a 3.1.26 apache for
all SuSE versions? Or are there just to many dependencies? For a quick
fix I just compiled apache 3.1.26 using the config.status from SuSE
and exhanged the binary and the modules, seems to run fine. However,
I don't use much additional mod packages like php4 etc...
-- Dipl.-Inform. Frank Steiner mailto:fstinformatik.uni-kiel.de Lehrstuhl f. Programmiersprachen mailto:fsteinerweb.de CAU Kiel, Olshausenstraße 40 Phone: +49 431 880-7265, Fax: -7613 D-24098 Kiel, Germany http://www.informatik.uni-kiel.de/~fst/
-- To unsubscribe, e-mail: suse-security-unsubscribesuse.com For additional commands, e-mail: suse-security-helpsuse.com Security-related bug reports go to securitysuse.de, not here