You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2012/12/26 06:30:57 UTC

[Bug 54350] New: Linux / Chapro.A Exploit

https://issues.apache.org/bugzilla/show_bug.cgi?id=54350

            Bug ID: 54350
           Summary: Linux / Chapro.A Exploit
           Product: Apache httpd-2
           Version: 2.5-HEAD
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: All
          Assignee: bugs@httpd.apache.org
          Reporter: prajithpalakkuda@gmail.com
    Classification: Unclassified

some of our server was hacked using  Linux / Chapro.A module, But our servers
are configured with highly secured passwords and blocked ssh connections from
external IPs, We doubt its is a bug with the apache 2.X. Please let us know.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


[Bug 54350] Linux / Chapro.A Exploit

Posted by bu...@apache.org.
https://issues.apache.org/bugzilla/show_bug.cgi?id=54350

Eric Covener <co...@gmail.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |INVALID

--- Comment #1 from Eric Covener <co...@gmail.com> ---
Bugzilla is for reporting bugs, not support.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org