From owner-freebsd-isp@FreeBSD.ORG Thu Jul 8 06:41:51 2004 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id C06BC16A4F7 for ; Thu, 8 Jul 2004 06:41:51 +0000 (GMT) Received: from gen129.n001.c02.escapebox.net (gen129.n001.c02.escapebox.net [213.73.91.129]) by mx1.FreeBSD.org (Postfix) with ESMTP id 554F643D39 for ; Thu, 8 Jul 2004 06:41:51 +0000 (GMT) (envelope-from gemini@geminix.org) Message-ID: <40ECECAC.4070407@geminix.org> Date: Thu, 08 Jul 2004 08:41:48 +0200 From: Uwe Doering Organization: Private UNIX Site User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.7) Gecko/20040629 X-Accept-Language: en-us, en MIME-Version: 1.0 To: freebsd-isp@freebsd.org References: <79db6ae04070711106e9f2e35@mail.gmail.com> In-Reply-To: <79db6ae04070711106e9f2e35@mail.gmail.com> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Received: from gemini by geminix.org with asmtp (TLSv1:AES256-SHA:256) (Exim 3.36 #1) id 1BiSbN-0002GK-00; Thu, 08 Jul 2004 08:41:50 +0200 Subject: Re: Apache 1.3.x proxy hole X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Jul 2004 06:41:51 -0000 Joe Hamelin wrote: > Techworld is reporting that: "The bug affects Apache 1.3.x > installations configured to act as proxy servers, which relay requests > between a Web browser and the Internet. When a vulnerable server > connects to a malicious site, a specially-crafted packet can be used > to exploit the vulnerability, according to security researcher Georgi > Guninski, who has publicly released exploit code." > > http://bsdnews.com/view_story.php3?story_id=4628 > > http://www.techworld.com/opsys/news/index.cfm?newsid=1814&page=1&pagepos=2 > > Does anyone know of a FreeBSD patch for this out yet? The links in the respective advisories lead to GG's advisory #69. A fix for that went into the Apache 1.3.x port (www/apache13) on June 11, 2004. So this in fact appears to be old news. Uwe -- Uwe Doering | EscapeBox - Managed On-Demand UNIX Servers gemini@geminix.org | http://www.escapebox.net