lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20020731071324.GA14819@c9x.org>
From: j at pureftpd.org (Jedi/Sector One)
Subject: OpenSSL problem: is mod_ssl also vulnerable?

On Wed, Jul 31, 2002 at 08:50:31AM +0200, Peter Bieringer wrote:
> does anyone know whether mod_ssl (used with Apache 1.3) is also
> vulnerable. Currently, last version seen on their webpage is 2.8.10
> (24 June 2002).

  Yes, the OpenSSL vulnerability can be triggered through mod_ssl.
  
  But you don't need a new mod_ssl version to be safe against it. Only bring
OpenSSL up to date, and your mod_ssl module will be safe.

-- 
 __  /*-      Frank DENIS (Jedi/Sector One) <j@...Networks.Com>     -*\  __
 \ '/    <a href="http://www.PureFTPd.Org/"> Secure FTP Server </a>    \' /
  \/  <a href="http://www.Jedi.Claranet.Fr/"> Misc. free software </a>  \/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ