On Fri, Jun 21, 2002 at 05:31:00AM -0700, Ask Bjoern Hansen wrote:
> On Wed, 19 Jun 2002, dreamwvr wrote:
> 
> > "my comments FWIW"
> > This means thus far does not impact as_seriously little endian NIX
> > based architectures. The reason being? That Apache spawns a pool of
> > child processes to serve requests. Therefore a DoS kills the child serving
> [...]
> 
> This doesn't make much sense at all.
To elaborate this opinion was based on the conclusions of one of 
the advisories ..  
> 64bit binaries are exploitable.  There are also exploits for several
> 32bit systems.
well I did not say that x86 was not exploitable. However nix based
archs were more difficult. This due to spawning ps rather than 
as windows and novell using a single process and many threads. 
That was directly from an advisory.. actually. && in reference to 
the SEGVs .. directly. 
> If done "right" these will give the attacker shell access to the
> server.  Your comments about threaded vs "multi processed" are only
> relevant when the exploit is not "done right" (when the server
> SEGVs).
True; ( && that is what exactly I was referring to.. :) 
well any exploit "if_done_right" can expand into a full blown 
remote exploit for example. Once someone is local then basically
it is only a matter of time. IMHO. OR if you like sooner or later.

Best Regards,
[EMAIL PROTECTED]

-- 
/*  Security is a work in progress - dreamwvr                 */
#                                                             
# Note: To begin Journey type man afterboot,man help,man hier[.]      
#                                                             
// "Who's Afraid of Schrodinger's Cat?" /var/(.)?mail/me \?  ;-]

Reply via email to