[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[cobalt-users] Apache Chunked Vulnerability and Cobalt servers



Psych 101 - Never underestimate the power of denial...

Anyone who owns anything with a Cobalt tag on the
front panel, *IS* vulnerable to the Apache issue...!

I personally have had one RaQ3 that was DoS'd _twice_
this week, the first time even one day before the CERT
announcement even hit the wild (appears certainly
circles ($$) have had this info a bit longer)..

Worse, CERT has revised their statement to now state
that this issue will allow the _execution_ of
arbitrary code by remote hackers on ALL Apache
versions effected by this bug (1.2.2 through 1.3.24
inclusive) -regardless if it's a 32/64 bit and/or
*nix/Windows OS -it makes NO difference! That would
mean ALL Cobalt products are vulnerable..!!

http://www.cert.org/advisories/CA-2002-17.html

>For Apache versions 1.2.2 through 1.3.24 inclusive,
>this vulnerability may allow the execution of 
>arbitrary code by remote attackers. Exploits are 
>publicly available that claim to allow the 
>execution of arbitrary code.

If you want to do something, start shaking the
Cobalt/SUN tree and demand if/when they plan on
releasing updates to Apache for their products, as
Apache has already released 1.3.26 to address this
issue two days ago...!!  The issue/question has
already been raised on the security list (yesterday a
few times) but no word yet from Cobalt regarding this
HUGE HOLE currently at this time.. So little ducks,
just sit and wait...



__________________________________________________
Do You Yahoo!?
Yahoo! - Official partner of 2002 FIFA World Cup
http://fifaworldcup.yahoo.com