You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2002/06/28 00:11:46 UTC

DO NOT REPLY [Bug 10302] - Apache 2.0.39 appears to be vulnerable to DoS, possibly worse

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10302>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10302

Apache 2.0.39 appears to be vulnerable to DoS, possibly worse





------- Additional Comments From jwoolley@apache.org  2002-06-27 22:11 -------
We discovered a few conditions like this under certain configurations after 2.0.39 was released.  The ones we know about are fixed in CVS.  Can you try HEAD?  Run the exploit code against it if you like and see what happens; it should be better-behaved than 2.0.39.  2.0.40 will be released soon, by the way, so it would be good to have verification that all known issues in this regard are cleaned up before then.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org