You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2012/12/26 06:30:57 UTC
[Bug 54350] New: Linux / Chapro.A Exploit
https://issues.apache.org/bugzilla/show_bug.cgi?id=54350
Bug ID: 54350
Summary: Linux / Chapro.A Exploit
Product: Apache httpd-2
Version: 2.5-HEAD
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: All
Assignee: bugs@httpd.apache.org
Reporter: prajithpalakkuda@gmail.com
Classification: Unclassified
some of our server was hacked using Linux / Chapro.A module, But our servers
are configured with highly secured passwords and blocked ssh connections from
external IPs, We doubt its is a bug with the apache 2.X. Please let us know.
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org
[Bug 54350] Linux / Chapro.A Exploit
Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=54350
Eric Covener <co...@gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |INVALID
--- Comment #1 from Eric Covener <co...@gmail.com> ---
Bugzilla is for reporting bugs, not support.
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org