[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-security] Fw: [SECURITY] Remote exploit for 32-bit Apache HTTP Server known
- Subject: Re: [cobalt-security] Fw: [SECURITY] Remote exploit for 32-bit Apache HTTP Server known
- From: Tom Worley <raq@xxxxxxxxxxxx>
- Date: Sat, 22 Jun 2002 00:42:38 +0100
- Organization: Worley Web Solutions
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
On Friday 21 June 2002 11:06 pm, njd 76 wrote:
> I agree with Tom and all the other Cobalt owners. Give us the upgrade! This
> is just crazy to wait this long. We need Sun to take this more serious.
Yeah,
What is even more worrying is that the admserv (at least on raq3/4) is run as
root, so if a raq3/4 (and probably all the other cobalt servers) were
attacked on the admin server they would have root access.....
Please give us some info Sun/Cobalt, this is very urgent as exploit code is
out in the wild.
--
Regards,
Tom Worley, Worley Web Solutions
RaQ Maintenance http://worleyweb.net
RaQ server help: http://uk2raq.com
RaQ backup: http://uk2raq.com/backup.php
TA2 game: http://totalannihilation2.com
Flying Linux in space: http://projectmist.org