Full Disclosure mailing list archives

Re: ***INTERLAND*** 's default vps PROBABLY has REMOTE COMPROMISE vulnerability


From: the lumpalaya <lumpy () the whole net>
Date: Sun, 15 Aug 2004 10:18:54 -0400 (EDT)

Oh yeah, I forgot to include this link, in case it happens to be the
case.. not that I would know, I dont use Interland...

https://www.redhat.com/advice/speaks_backport.html


On Sun, 15 Aug 2004, Liu Die Yu wrote:

this message is only useful for INTERLAND users and spammers.

INTERLAND is the most popular web hosting corporation online - even
bigger than VERIO - according to 3rd-party survey. INTERLAND's default
vps PROBABLY has REMOTE COMPROMISE vulnerability. "PROBABLY" means i
just checked the version # of apache, but have not exploited it yet.

when i was planning to run my webapp on INTERLAND's web server, i found
the server is running apache.1.3.22 and php4.0.x. after checking
security record at httpd.apache.org AND php.net, i found both apache and
php contain serious vulnerabilities:

the most serious problem is critical: apache1.3.22 contains REMOTE
COMPROMISE vulnerability:
    Apache Chunked encoding vulnerability  CVE-2002-0392

i created support ticket in my account, and waited for about 36 hours,
but no one responded. then i closed the ticket. it looks like the
support staff don't care for remote compromise - or too busy to fix it.
so INTERLAND users must download and install apache themselves.

for demonstration purpose, the following INTERLAND websites are running
apache1.3.22
209.203.227.116,  209.203.227.115, 209.203.227.114
209.203.227.117 is an exception - it's my web server with apache1.3.32
and php5 :-))))

Regards,

Liu Die Yu
http://umbrella.name/people/liu.dieyu/

UMBRELLA.NAME

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: