LANMAN
Platinum Member
FYI:
Apache Remote Compromise: X-Force has verified that this issue is exploitable on Apache HTTP Server for Windows (Win32) version 1.3.24 as well as Apache HTTP Server version 1.3.24 for OpenBSD. It has been reported that exploit code has been developed for the following operating systems and platforms: Sun Solaris 6-8 (sparc/x86); FreeBSD 4.3-4.5 (x86); OpenBSD 2.6-3.1 (x86); and Linux (GNU) 2.4 (x86). These vulnerabilities may lead to modified Web content, denial of service, or further compromise. Apache accounts for over 63% of all active Web sites.
Patch your systems immediately!!!
--LANMAN
Apache Remote Compromise: X-Force has verified that this issue is exploitable on Apache HTTP Server for Windows (Win32) version 1.3.24 as well as Apache HTTP Server version 1.3.24 for OpenBSD. It has been reported that exploit code has been developed for the following operating systems and platforms: Sun Solaris 6-8 (sparc/x86); FreeBSD 4.3-4.5 (x86); OpenBSD 2.6-3.1 (x86); and Linux (GNU) 2.4 (x86). These vulnerabilities may lead to modified Web content, denial of service, or further compromise. Apache accounts for over 63% of all active Web sites.
Patch your systems immediately!!!
--LANMAN