1. RH a zis ca Apache nu ar trebui sa fie o problema : Our investigations show that this bug cannot be used to gain remote access to a server running Apache on Red Hat Linux on 32-bit platforms, but it does cause the child process to die. The Apache parent process will notice this and start a new child process when necessary -- using more resources than normal.
Investigations by the Apache Software Foundation show that in some cases 64-bit platforms may have a greater exposure and could be remotely exploited to allow arbitrary code to be run on the server. 2. nu vad legatura cu cele dinainte marian wrote: >Am incercat un exploit de apache de pe >packetstorm pe un 1.3.12.. +redhat. >Din fericire nu a facut nimic.. serverul a >rezistat eroic :)) (expl era facut pt >freebsd si netbsd, dar mai avea si un >bruteforce mode). >Questions: >1. E vuln si apache de RedHat (daca >openssh de redhat e mai bun, poate si >apache de redhat e mai bun :))) ? >2. Cum ati rezovat pb asta avand in vedere >ca apache 2 merge naspa cu php ? > > >--- >Pentru dezabonare, trimiteti mail la >[EMAIL PROTECTED] cu subiectul 'unsubscribe rlug'. >REGULI, arhive si alte informatii: http://www.lug.ro/mlist/ > > > > --- Pentru dezabonare, trimiteti mail la [EMAIL PROTECTED] cu subiectul 'unsubscribe rlug'. REGULI, arhive si alte informatii: http://www.lug.ro/mlist/
