Originally posted by: Brazen
In case nobody else has mentioned this... I just want to point out that while running Apache on Windows sounds like it would be more secure, Apache does have known exploits and there is not way (that I know of) to have automatic scheduled patching for Apache on Windows - you would have to be sure to check periodically for new versions for security patches. However with IIS on Windows, you get nightly checks for updates. Of course the best route would be Apache on Linux, since it can be easily automatically patched on a schedule using yum on Fedora or apt on Debian.
According to Secunia:
Apache 1.3 (a.k.a. the decent one):
Unpatched vulnerability 1: I don't know what this check_forensic script is, but it isn't on my systems (it's aparently in apache-utils package 1.3.31). It's a local attack, requiring the attacker to have a system account. And, it only works with the privs of the user running the script. So if it isn't root, it shouldn't overwrite anything important.
Partial fix 1: this is a cross-site scripting attack that affects a number of web servers, not just apache. It also only affects servers that do reverse DNS lookups, which isn't smart on busier sites.
Apache 2 (a.k.a. the other one):
Unpatched vulnerability 1: See #1 above.
Unpatched vulnerability 2: Requires a malicious administrator. It's also supposedly a local "exploit."
Partial fix 1: See #1 above.
What exploits am I missing? Because these are just crap.