[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-security] Re: Code Red Special Effects (WAS: Hacking my Raq4i???)
- Subject: RE: [cobalt-security] Re: Code Red Special Effects (WAS: Hacking my Raq4i???)
- From: "Simon Wilson" <simon@xxxxxxxxxxxxx>
- Date: Wed, 8 Aug 2001 11:53:46 +0100
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
A snip from an e-mail I received this morning from Chilisoft! for all those
that
went into panic mode when they read yesterday about code red II and
chilisoft.
Simon
>I want to let you know that in no way does Chili!Soft ASP use ISAPI
>modules on a Linux or any flavor of Unix. The "Code Red" exploit only
>works on Windows servers using IIS.
>Chili!Soft ASP is implemented in the native language of whichever web
>server we are associated with. Thus for Apache, we use an Apache
>Module, for Netscape, we use an NSAPI module, etc....
>Chili!Soft ASP does not rely on Front Page extensions in any way. It
>will only run .asp or .asa files according to the rules of ASP.
>Chili!Soft Product Management Team
>Sun Microsystems
_______________________________________________
cobalt-security mailing list
cobalt-security@xxxxxxxxxxxxxxx
http://list.cobalt.com/mailman/listinfo/cobalt-security