Return-Path: X-Original-To: apmail-httpd-users-archive@www.apache.org Delivered-To: apmail-httpd-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 15A9B10248 for ; Fri, 8 Nov 2013 10:18:46 +0000 (UTC) Received: (qmail 73269 invoked by uid 500); 8 Nov 2013 10:18:41 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 73205 invoked by uid 500); 8 Nov 2013 10:18:33 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 73196 invoked by uid 99); 8 Nov 2013 10:18:31 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 08 Nov 2013 10:18:31 +0000 X-ASF-Spam-Status: No, hits=1.5 required=5.0 tests=HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of techienote.com@gmail.com designates 209.85.216.173 as permitted sender) Received: from [209.85.216.173] (HELO mail-qc0-f173.google.com) (209.85.216.173) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 08 Nov 2013 10:18:25 +0000 Received: by mail-qc0-f173.google.com with SMTP id l13so1531451qcy.32 for ; Fri, 08 Nov 2013 02:18:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=CXGDsdtDPdWYAUz10MmieRmOOVkbqPlm44znmcYM8aA=; b=hrcZW5e1ETeBLe2Xx8RJ5T0n4tj6CRVhq5CurtxpO2+Vs4qeyF+rpxShaxVxhCcA5O K+Rt4PFrZmuxnDb8Bj34gdS5b1P2BTXDxxONzZQegnU2s72RKRueENqCUpdHCxLb9WMl UgRZqaSt238s9hPwIyFJ9L9Gj7vj646hCDe30s87cbQRllb/1saTGVPZIhFEYavygFc+ VB0RC+1oZ1bQEJTZ0mi1mFhLRQiRrUO3vL6Y4yec3sBI+im8FBg2bV7PEq4PhveMQmfr 9u1feBTkdR0FosDKRUFkS6PaIqbbJVlHiBwG+oKcoKZDDJMdLFbR4OWkZa4xOakRROqo 3t4g== MIME-Version: 1.0 X-Received: by 10.229.246.198 with SMTP id lz6mr20892021qcb.20.1383905884465; Fri, 08 Nov 2013 02:18:04 -0800 (PST) Received: by 10.96.31.198 with HTTP; Fri, 8 Nov 2013 02:18:04 -0800 (PST) Received: by 10.96.31.198 with HTTP; Fri, 8 Nov 2013 02:18:04 -0800 (PST) In-Reply-To: References: Date: Fri, 8 Nov 2013 15:48:04 +0530 Message-ID: From: Vidyadhar To: users Content-Type: multipart/alternative; boundary=001a11348dc4a56ed804eaa7b223 X-Virus-Checked: Checked by ClamAV on apache.org Subject: Re: [users@httpd] Apache Vulnerability --001a11348dc4a56ed804eaa7b223 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable Hi Pratibha, On 8 Nov 2013 13:39, wrote: > > Hi, > > > > > > We have received one apache vulnerability from our security auditors =93T= he remote web server is load-balanced.=94 The solution to which is provided as =93Update the web configuration to hide information disclosure.=94 .Can you please explain what configuration needs to be done in order to rectify this vulnerability. Is it possible to share the detailed report for this vulnerability? Regards, Vidyadhar > > > > > > -- > > Regards > > Pratibha > > > > Please do not print this email unless it is absolutely necessary. > > The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments. > > WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email. > > www.wipro.com --001a11348dc4a56ed804eaa7b223 Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: quoted-printable

Hi Pratibha,

On 8 Nov 2013 13:39, <pratibha.dhankhar@wipro.com> wrote:
>
> Hi,
>
> =A0
>
> =A0
>
> We have received one apache vulnerability from our security auditors = =93The remote web server is load-balanced.=94 The solution to which is prov= ided as =93Update the web configuration to hide information disclosure.=94 = .Can you please explain what configuration needs to be done in order to rec= tify this vulnerability.
Is it possible to share the detailed report for this vulnerability?

Regards,
Vidyadhar
>
> =A0
>
> =A0
>
> --
>
> Regards
>
> Pratibha
>
> =A0
>
> Please do not print this email unless it is absolutely necessary.
>
> The information contained in this electronic message and any attachmen= ts to this message are intended for the exclusive use of the addressee(s) a= nd may contain proprietary, confidential or privileged information. If you = are not the intended recipient, you should not disseminate, distribute or c= opy this e-mail. Please notify the sender immediately and destroy all copie= s of this message and any attachments.
>
> WARNING: Computer viruses can be transmitted via email. The recipient = should check this email and any attachments for the presence of viruses. Th= e company accepts no liability for any damage caused by any virus transmitt= ed by this email.
>
> www.wipro.com

--001a11348dc4a56ed804eaa7b223--