[Previous] [Next] [Index] [Thread]

Re: CIAC Advisory F-11 Report: Unix NCSA httpd Vulnerability



Also if you do patch the source to do the bounds check, do yourself
a favor and log any system that trys to exploit this bug. Such information
is extremely useful in tracking down penetration attempts on your system
from systems that are already penetrated (possibly without the knowledge
of the sysadmin). 

--Chuck McManis
Sun Microsystems