Hi, 

I just ran the "Retina Apache Chunked Scanner" from
http://www.eeye.com/html/Research/Tools/apachechunked.html

I scanned all my IP's and it reported that both my potato boxes where 
vulnerable to this exploit.  I have patched both servers with the updated 
packages for potato: 

[EMAIL PROTECTED]:~$ dpkg -l | grep apache
ii  apache         1.3.9-14.1     Versatile, high-performance HTTP server
ii  apache-common  1.3.9-14.1     Support files for all Apache webservers
ii  libapache-mod- 1.21.20000309- Integration of perl with the Apache web serv
ii  libapache-mod- 2.4.10-1.3.9-1 Strong cryptography for Apache
ii  libapache-mod- 2.4.10-1.3.9-1 Documentation for Apache module mod_ssl

Is it just this scanner that is reporting a false positive, or is potato stil 
vulnerable? 

>From the help file of the scanner: 

        How It Works 

        The Retina Apache Chunked Scanner detects Apache servers which can be
        compromised by the Apache Chunked Encoding vulnerability . The scanner
        works by attempting to sending a small request that makes a vulnerable
        server to become unresponsive. As usually Apache runs with more than 1
        process, there would be no down time while the test is performed.


This indicates that is actually trys the exploit and not just check the version 
number of the apache server.  Should I worry? 

Btw, my woody boxes does not show up as vulnerable. 
                                
-- 
Bjarne Østby
A novice on a steep learning curve.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to