[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [cobalt-users] URGENT: CERT - Apache buffer overrun



-----Original Message-----
From: E.B. Dreger [mailto:eddy+public+spam@xxxxxxxxxxxxxxxxx]
Sent: Tuesday, June 18, 2002 12:37 AM
To: cobalt-users@xxxxxxxxxxxxxxx
Subject: [cobalt-users] URGENT: CERT - Apache buffer overrun


Greetings all,


Watch out RAQ 3, 4, XTR, and 550 owners.  Ditto Qube 3 and 4.
CERT advisory follows my .signature and spam-trapping... please
scroll down.

*grumble*

<details deleted>
_______________________________________________

Why do you think that "RAQ 3, 4, XTR, and 550 owners"
are vulnerable to this exploit? As I read the text
it said Windows OSes and 64 bit *nix systems. Does the
Raq550 have a 64 bit CPU that I don't know about?