lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <18001214.1028299569@[10.3.62.6]>
From: pbieringer at aerasec.de (Dr. Peter Bieringer)
Subject: OpenSSL problem: what about apache2 binaries?

Hi,

--On Mittwoch, 31. Juli 2002 08:50 +0200 Peter Bieringer <pb@...ringer.de>
wrote:

> sorry, no announcement, but a (perhaps important) question:
> 
> does anyone know whether mod_ssl (used with Apache 1.3) is also
> vulnerable. Currently, last version seen on their webpage is 2.8.10
> (24 June 2002).

Next question: what about the apache2 binaries (especially for Windows)?

Apache2 has built-in SSL capability, I think (but not tested) also in the
Windows binary. If yes, which SSL code is used here?

Latest available is 2.0.39 from 18-Jun-2002
http://www.apache.org/dist/httpd/binaries/win32/

Thank you very much for more information,

	Peter


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ