[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[cobalt-users] Apache Chunked Vulnerability and Cobalt servers
- Subject: [cobalt-users] Apache Chunked Vulnerability and Cobalt servers
- From: Chad <chad_ny_01@xxxxxxxxx>
- Date: Fri Jun 21 08:31:45 2002
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
Psych 101 - Never underestimate the power of denial...
Anyone who owns anything with a Cobalt tag on the
front panel, *IS* vulnerable to the Apache issue...!
I personally have had one RaQ3 that was DoS'd _twice_
this week, the first time even one day before the CERT
announcement even hit the wild (appears certainly
circles ($$) have had this info a bit longer)..
Worse, CERT has revised their statement to now state
that this issue will allow the _execution_ of
arbitrary code by remote hackers on ALL Apache
versions effected by this bug (1.2.2 through 1.3.24
inclusive) -regardless if it's a 32/64 bit and/or
*nix/Windows OS -it makes NO difference! That would
mean ALL Cobalt products are vulnerable..!!
http://www.cert.org/advisories/CA-2002-17.html
>For Apache versions 1.2.2 through 1.3.24 inclusive,
>this vulnerability may allow the execution of
>arbitrary code by remote attackers. Exploits are
>publicly available that claim to allow the
>execution of arbitrary code.
If you want to do something, start shaking the
Cobalt/SUN tree and demand if/when they plan on
releasing updates to Apache for their products, as
Apache has already released 1.3.26 to address this
issue two days ago...!! The issue/question has
already been raised on the security list (yesterday a
few times) but no word yet from Cobalt regarding this
HUGE HOLE currently at this time.. So little ducks,
just sit and wait...
__________________________________________________
Do You Yahoo!?
Yahoo! - Official partner of 2002 FIFA World Cup
http://fifaworldcup.yahoo.com