httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 37244] - Apache 1.3.33 : binary characters in HTTP header - buffer overflow during HTTP transactions??
Date Wed, 26 Oct 2005 09:13:04 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=37244>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=37244





------- Additional Comments From nick@webthing.com  2005-10-26 11:13 -------
SSL on Apache 1.x is well known to be complex and leave a lot of scope for 
incompatibility with (other) modules.  A term to google for is EAPI.  Since 
it's been obsolete for three and a half years, usual advice is to upgrade. 
 
Have you tried disabling keepalives as a workaround? 

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message