Return to errata30.html CVS log | Up to [local] / www |
version 1.15, 2002/06/28 08:05:38 | version 1.16, 2002/06/28 10:36:19 | ||
---|---|---|---|
|
|
||
This problem is fixed in <a href="http://www.openssh.com/openbsd.html">OpenSSH | This problem is fixed in <a href="http://www.openssh.com/openbsd.html">OpenSSH | ||
3.4</a>, and a patch for the vulnerable releases is available as part of the | 3.4</a>, and a patch for the vulnerable releases is available as part of the | ||
<a href="http://www.openssh.com/txt/preauth.adv">security advisory</a>. | <a href="http://www.openssh.com/txt/preauth.adv">security advisory</a>. | ||
<br> | |||
<p> | <p> | ||
<a name=modssl></a> | <a name=modssl></a> | ||
<li><font color=#009000><strong>023: SECURITY FIX: June 24, 2002</strong></font><br> | <li><font color=#009000><strong>023: SECURITY FIX: June 24, 2002</strong></font><br> | ||
A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd | A buffer overflow can occur in the .htaccess parsing code in mod_ssl httpd | ||
module, leading to possible remote crash or exploit. | module, leading to possible remote crash or exploit.<br> | ||
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/023_mod_ssl.patch">A source code patch exists which remedies the problem</a>. | <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/023_mod_ssl.patch">A source code patch exists which remedies the problem</a>. | ||
<p> | <p> | ||
<a name=httpd></a> | <a name=httpd></a> |