Fernando Nunes wrote:
> 
> I am using RedHat 7.3 with Apache 1.3.23. Someone used the 
> program "bugtraq.c" to explore an modSSL buffer overflow to get access to 
> a shell. The attack creates a file named "/tmp/.bugtraq.c" and compiles it 
> using gcc. The program is started with another computer ip address as 
> argument. All computer files that the user "apache" can read are exposed.
> The program attacks the following Linux distributions:
> 
> Red-Hat: Apache 1.3.6,1.3.9,1.3.12,1.3.19,1.3.20,1.3.22,1.3.23,1.3.26
> SuSe: Apache 1.3.12,1.3.17,1.3.19,1.3.20,1.3.23
> Mandrake: 1.3.14,1.3.19
> Slakware: Apache 1.3.26

Note that if you are using Apache 1.3.23 you are probably also 
vulnerable to the chunked overflow bug.

If people would stay up to date with security patches, this stuff 
wouldn't happen.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

Reply via email to