[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-users] URGENT: CERT - Apache buffer overrun
- Subject: RE: [cobalt-users] URGENT: CERT - Apache buffer overrun
- From: "Jolley, Carl" <Carl.Jolley@xxxxxxx>
- Date: Tue Jun 18 09:02:01 2002
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
-----Original Message-----
From: E.B. Dreger [mailto:eddy+public+spam@xxxxxxxxxxxxxxxxx]
Sent: Tuesday, June 18, 2002 12:37 AM
To: cobalt-users@xxxxxxxxxxxxxxx
Subject: [cobalt-users] URGENT: CERT - Apache buffer overrun
Greetings all,
Watch out RAQ 3, 4, XTR, and 550 owners. Ditto Qube 3 and 4.
CERT advisory follows my .signature and spam-trapping... please
scroll down.
*grumble*
<details deleted>
_______________________________________________
Why do you think that "RAQ 3, 4, XTR, and 550 owners"
are vulnerable to this exploit? As I read the text
it said Windows OSes and 64 bit *nix systems. Does the
Raq550 have a 64 bit CPU that I don't know about?