You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2002/07/03 00:14:31 UTC
DO NOT REPLY [Bug 10368] -
security bug on apache 1.3.26 with Tru64 unix
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=10368
security bug on apache 1.3.26 with Tru64 unix
trawick@apache.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
------- Additional Comments From trawick@apache.org 2002-07-02 22:14 -------
How did you verify that the problem is not resolved with 1.3.26? We've done a
number of before/after tests on a number of other platforms. Just now I built
1.3.26 on Tru64 5.1 and get the expected behavior (Apache returns error 400
to browser) when I try to exploit the overflow condition in the old code.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org