Re: bugtraq.c httpd apache ssl attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Fernando Nunes wrote:
> 
> I am using RedHat 7.3 with Apache 1.3.23. Someone used the 
> program "bugtraq.c" to explore an modSSL buffer overflow to get access to 
> a shell. The attack creates a file named "/tmp/.bugtraq.c" and compiles it 
> using gcc. The program is started with another computer ip address as 
> argument. All computer files that the user "apache" can read are exposed.
> The program attacks the following Linux distributions:
> 
> Red-Hat: Apache 1.3.6,1.3.9,1.3.12,1.3.19,1.3.20,1.3.22,1.3.23,1.3.26
> SuSe: Apache 1.3.12,1.3.17,1.3.19,1.3.20,1.3.23
> Mandrake: 1.3.14,1.3.19
> Slakware: Apache 1.3.26

Note that if you are using Apache 1.3.23 you are probably also 
vulnerable to the chunked overflow bug.

If people would stay up to date with security patches, this stuff 
wouldn't happen.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux