Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jun 2002 02:49:35 -0700 (PDT)
From:      Muhammad Faisal Rauf Danka <mfrd@attitudex.com>
To:        isp-tech@isp-tech.com, isp-security@isp-security.com, isp-linux@isp-linux.com
Cc:        freebsd-security@freebsd.org, security-discuss@linuxsecurity.com
Message-ID:  <20020620094935.9CB9036F9@sitemail.everyone.net>

next in thread | raw e-mail | index | archive | help
GOBBLES Security released Remote Apache 1.3.x Exploit, at http://online.securityfocus.com/attachment/2002-06-20/apache-scalp.c

As it's mentioned in the exploit that:
< * The "experts" have already concurred that this bug...
 *      -       Can not be exploited on 32-bit *nix variants
 *      -       Is only exploitable on win32 platforms
 *      -       Is only exploitable on certain 64-bit systems
 *
 * However, contrary to what ISS would have you believe, we have
 * successfully exploited this hole on the following operating systems:
 *
 *      Sun Solaris 6-8 (sparc/x86)
 *      FreeBSD 4.3-4.5 (x86)
 *      OpenBSD 2.6-3.1 (x86)
 *      Linux (GNU) 2.4 (x86)
 *
 * Don't get discouraged too quickly in your own research. It took us close
 * to two months to be able to exploit each of the above operating systems.
 * There is a peculiarity to be found for each operating system that makes the
 * exploitation possible.
 >

So i think x86 apache admins shouldn't be like "[ aah its only for win32 and 64 bit *nixes, ]"

and I again repeat that even 64 bit *nixes include SPARCH Solaris which is found in abundance. 

I think its about time Sun people should take notice of it.

Sites like sunfreeware.com and alike should put updated apache packages. else bad time for solaris sparc apache admins.

Regards, 
---------
Muhammad Faisal Rauf Danka

Chief Technology Officer
Gem Internet Services (Pvt) Ltd.
web: www.gem.net.pk

Vice President
Pakistan Computer Emergency Responce Team (PakCERT)
web: www.pakcert.org

Chief Security Analyst
Applied Technology Research Center (ATRC)
web: www.atrc.net.pk

_____________________________________________________________
---------------------------
[ATTITUDEX.COM]
http://www.attitudex.com/
---------------------------

_____________________________________________________________
Promote your group and strengthen ties to your members with email@yourgroup.org by Everyone.net  http://www.everyone.net/?btn=tag

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020620094935.9CB9036F9>