Re: Apache 2.x APR Exploit Code

From: Lars Eilebrecht (larsat_private)
Date: Mon Jun 09 2003 - 13:34:09 PDT

  • Next message: Over_G: "Directory traversal in NucaWeb Server"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    According to mattmurphyat_private:
    
    > Workarounds
    [...]
    
    While those workarounds are ok in principle, it should be noted
    that this bug (CAN-2003-0245) has been fixed in Apache 2.0.46
    published about two weeks ago.
    
    Instead of applying any workaround an update to the latest
    Apache version is recommended.
    
    
    Regards...
    - -- 
    Lars Eilebrecht   -   The Apache Software Foundation
    larsat_private   -       http://www.apache.org/
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iQCSAwUBPuTvQT6Pt/L4g0HZAQENYwPnYLC/RZTPINjCiY8v4tRS+7To7JBgUXjL
    GZVxeay/0Nmw/oSa6U2DT+ajlswXYZB9fs7BniSM5wiqsg4x/gt4ZZAGsnbwP+Up
    p1CFte/SzwUmAIOYPFkCfv22nHiAg953cDc7YOhIKDjW4sWcGblMEXKA84qly6DQ
    BUd8IOo=
    =qoCl
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Tue Jun 10 2003 - 07:10:55 PDT