httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 10368] - security bug on apache 1.3.26 with Tru64 unix
Date Tue, 02 Jul 2002 22:14:31 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368

security bug on apache 1.3.26 with Tru64 unix

trawick@apache.org changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |WORKSFORME



------- Additional Comments From trawick@apache.org  2002-07-02 22:14 -------
How did you verify that the problem is not resolved with 1.3.26?  We've done a 
number of before/after tests on a number of other platforms.  Just now I built
1.3.26 on Tru64 5.1 and get the expected behavior (Apache returns error 400
to browser) when I try to exploit the overflow condition in the old code.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message