You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2002/07/03 00:14:31 UTC

DO NOT REPLY [Bug 10368] - security bug on apache 1.3.26 with Tru64 unix

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368

security bug on apache 1.3.26 with Tru64 unix

trawick@apache.org changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |WORKSFORME



------- Additional Comments From trawick@apache.org  2002-07-02 22:14 -------
How did you verify that the problem is not resolved with 1.3.26?  We've done a 
number of before/after tests on a number of other platforms.  Just now I built
1.3.26 on Tru64 5.1 and get the expected behavior (Apache returns error 400
to browser) when I try to exploit the overflow condition in the old code.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org