Hello NetByte,

well kelihatannya kontradiktif, mereka sdg membahas
"mis-implementation warning" mod_usertrack, bukan hole apache:

"It should be noted that this is not a vulnerability in Apache. This is only
a vulnerability when an application uses these IDs to track authenticated
users."

:)

Saturday, December 15, 2001, 10:19:02 AM, you wrote:

N> Seaman aman nya suatu product, selagi buatan manusia masih bisa di bobol ama
N> manusia juga, yang pernah saya baca Apache 1.3.19 di OpenBSD 2.9 bisa di
N> exploit dengan mengunakan remote exploit, sayang tadi cari cari berita nya
N> nggak dapet lagi. setelah hole di OpenSSH, Sekarang juga lagi
N> hangat-hangatnya pada bicarain hole di apache,

N> Apache mod_usertrack Predictable ID Generation Vulnerability
N> Apache is a popular open-source HTTP server in wide use across the Internet.
N> Apache ships with a module called 'mod_usertrack'. This module contains code
N> to generate unique identifiers for individual web sessions and requests.
N> The session IDs that are generated are not not random. They are generated
N> using the IP address of the client, the system time and the server process
N> ID. These IDs are not meant to be used for authentication purposes.
N> Any applications that rely on these IDs for authentication may be vulnerable
N> to ID prediction attacks.
N> It should be noted that this is not a vulnerability in Apache. This is only
N> a vulnerability when an application uses these IDs to track authenticated
N> users.

N> hal ini di alami pada apache versi

N> Apache Apache 1.3.11
N> Apache Apache 1.3.12
N> Apache Apache 1.3.14
N> Apache Apache 1.3.17
N> Apache Apache 1.3.18
N> Apache Apache 1.3.19
N> Apache Apache 1.3.20

N> sekarang tergantung kita sebagai brainware nya, mana yang paling kita kuasai


-- 
Best regards,
 dody suria wijaya                            mailto:[EMAIL PROTECTED]


-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3

Kirim email ke