-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Mon, 17 Jun 2002, CERT Advisory wrote: > III. Solution <snip> > Upgrade to the latest version > > The Apache Software Foundation has released two new versions of Apache > that correct this vulnerability. System administrators can prevent the > vulnerability from being exploited by upgrading to Apache version > 1.3.25 or 2.0.39. I've just visited http://httpd.apache.org/ for the upgrade on Apache and noted that v2.0.39 is available[*], but v1.3.25 is nowhere to be found. Is anyone in the know on an ETA for Apache v1.3.25? - -Jay * The source is available only on the main site so far. The mirrors have not yet caught up. ( ( _______ )) )) .--"There's always time for a good cup of coffee"--. >====<--. C|~~|C|~~| (>------ Jay D. Dyson -- jdyson@treachery.net ------<) | = |-' `--' `--' `-- I'll be diplomatic...when I run out of ammo. --' `------' -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (TreacherOS) Comment: See http://www.treachery.net/~jdyson/ for current keys. iD8DBQE9D5a2GI2IHblM+8ERAreAAJ9dyTh+FJDngzPUILwA7Y3JX8llwgCglGRW 2clwFrU6U9jM/Ie978ShuPQ= =+DJK -----END PGP SIGNATURE-----