[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-security] Fw: [SECURITY] Remote exploit for 32-bit Apache HTTP Server known
- Subject: Re: [cobalt-security] Fw: [SECURITY] Remote exploit for 32-bit Apache HTTP Server known
 
- From: Tom Worley <raq@xxxxxxxxxxxx>
 
- Date: Sat, 22 Jun 2002 00:42:38 +0100
 
- Organization: Worley Web Solutions
 
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
 
On Friday 21 June 2002 11:06 pm, njd 76 wrote:
> I agree with Tom and all the other Cobalt owners. Give us the upgrade! This
> is just crazy to wait this long. We need Sun to take this more serious.
Yeah,
What is even more worrying is that the admserv (at least on raq3/4) is run as 
root, so if a raq3/4 (and probably all the other cobalt servers) were 
attacked on the admin server they would have root access.....
Please give us some info Sun/Cobalt, this is very urgent as exploit code is 
out in the wild.
-- 
Regards,
Tom Worley,              Worley Web Solutions
RaQ Maintenance          http://worleyweb.net
RaQ server help:            http://uk2raq.com
RaQ backup:      http://uk2raq.com/backup.php
TA2 game:       http://totalannihilation2.com
Flying Linux in space: http://projectmist.org