Bugtraq mailing list archives
Re: Remote DoS attack in Real Networks Real Server (Strike #2) vulnerability
From: ryan () SECURITYFOCUS COM (Ryan Russell)
Date: Thu, 1 Jun 2000 17:02:46 -0700
I believe I have a temporary workaround. In the rmserver.cfg file, there's a section like this: <!-- H T T P S U P P O R T --> <List Name="HTTPDeliverable"> <Var Path_0="/admin"/> <Var Path_1="/ramgen"/> <Var Path_2="/farm"/> <Var Path_3="/httpfs"/> <Var Path_4="/viewsource"/> </List> On my Real server, I've removed this line: <Var Path_4="/viewsource"/> I *think* this only has the consequence that people can't pull down file details for audio content for the moment. We can still serve up audio just fine. Ryan
Current thread:
- Re: Remote DoS attack in Real Networks Real Server (Strike #2) vulnerability Ryan Russell (Jun 01)
- Re: Remote DoS attack in Real Networks Real Server (Strike #2) vulnerability Christopher Schulte (Jun 02)
- bind running as root in Mandrake 7.0 Nicolas MONNET (Jun 03)
- Re: bind running as root in Mandrake 7.0 Brock Sides (Jun 03)
- Re: bind running as root in Mandrake 7.0 White Vampire (Jun 03)
- Re: bind running as root in Mandrake 7.0 Andrew L . Davis (Jun 04)
- Re: bind running as root in Mandrake 7.0 Elias Levy (Jun 08)
- Circumventing Outlook Security Update File Download Security With IFRAMEs cassius () HUSHMAIL COM (Jun 09)
- Re: bind running as root in Mandrake 7.0 Nathan Neulinger (Jun 11)
- Remote DoS for Mercur 3.2 |[TDP]| (Jun 13)
- Vulnerability in Solaris ufsrestore Job de Haas (Jun 14)