[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-users] URGENT: CERT - Apache buffer overrun
- Subject: RE: [cobalt-users] URGENT: CERT - Apache buffer overrun
- From: "Peter Masloch" <peter@xxxxxxxxxxx>
- Date: Tue Jun 18 09:35:03 2002
- Organization: EasyniX Consulting
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
Not true. It says that the Stack Overflow is handled different
by 64-bit and 32-bit Unix platforms. On a 64-bit platform you
can control the Stack Overflow, on a 32-bit platform not. But
the Stack Overflow is still there. On the 32-bit platform it only
will cause a segmentation violation and the child process will be
terminated.
Peter
>Greetings all,
>
>
>Watch out RAQ 3, 4, XTR, and 550 owners. Ditto Qube 3 and 4.
>CERT advisory follows my .signature and spam-trapping... please
>scroll down.
>
>*grumble*
>
><details deleted>
>_______________________________________________
>
>Why do you think that "RAQ 3, 4, XTR, and 550 owners"
>are vulnerable to this exploit? As I read the text
>it said Windows OSes and 64 bit *nix systems. Does the
>Raq550 have a 64 bit CPU that I don't know about?
>
>_______________________________________________
>cobalt-users mailing list
>cobalt-users@xxxxxxxxxxxxxxx
>To Subscribe or Unsubscribe, please go to:
>http://list.cobalt.com/mailman/listinfo/cobalt-users
>
>