[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-users] URGENT: CERT - Apache buffer overrun
- Subject: Re: [cobalt-users] URGENT: CERT - Apache buffer overrun
- From: "Steve Bassi" <steve@xxxxxxxxx>
- Date: Tue Jun 18 06:52:01 2002
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
Just what the heck has this to do with us as a Cobalt list.
>
> We are not running windows on our Cobalts (no one I am aware of) and we
are
> not running any 64bit Unix boxes.
> Read the impact statement. These are the systems affected.
>
Apache state:
"In Apache 1.3 the issue causes a stack overflow. Due to the nature of the
overflow on 32-bit Unix platforms this will cause a segmentation violation
and the child will terminate."
A colleague of mine, feels that it will be able to cause the process of
apache to segv which will be effective as a DoS
So I guess it is relevant.
Bassi