<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apache Web Server Chunk Handling Vulnerability ????? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749802#M69887</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You are using the gcc compiler.&lt;BR /&gt;&lt;BR /&gt;I had the similar problem and got it resolved using ansic C compiler.&lt;BR /&gt;&lt;BR /&gt;if you have anci C compiler then try the following before &lt;BR /&gt;running configure&lt;BR /&gt;&lt;BR /&gt;# export CC=/opt/ansic/bin/cc&lt;BR /&gt;&lt;BR /&gt;# ./configure --prefix=/opt/apache&lt;BR /&gt;&lt;BR /&gt;I am sure it will work.&lt;BR /&gt;&lt;BR /&gt;-Niraj</description>
    <pubDate>Wed, 10 Jul 2002 02:53:38 GMT</pubDate>
    <dc:creator>Niraj Kumar Verma</dc:creator>
    <dc:date>2002-07-10T02:53:38Z</dc:date>
    <item>
      <title>Apache Web Server Chunk Handling Vulnerability ?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749795#M69880</link>
      <description>This question for HP:&lt;BR /&gt; When will HP release patch for "Apache Web Server Chunk Handling Vulnerability" or when will you release Apache Apache 1.3.26 and Apache 2.0.39?&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Fri, 21 Jun 2002 12:35:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749795#M69880</guid>
      <dc:creator>HPP</dc:creator>
      <dc:date>2002-06-21T12:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Web Server Chunk Handling Vulnerability ?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749796#M69881</link>
      <description>Just so everyone knows what you are talking about here. &lt;BR /&gt;&lt;BR /&gt;ALERT - APACHE WEB VULNERABILITY&lt;BR /&gt;&lt;BR /&gt;Free Vulnerability Scanning Utility Now Available &lt;BR /&gt;&lt;BR /&gt;Two days ago a vulnerability that affects Apache web server software was announced. The vulnerability is a remote buffer overflow in the section of code that handles chunked-encoding requests. It is possible for attackers to manipulate this vulnerability to execute code against any vulnerable versions of Apache. This includes the Unix and Windows versions.&lt;BR /&gt;&lt;BR /&gt;It should also be noted that since the Apache vulnerability was released, exploit programs that take advantage of the vulnerability have been distributed to the Internet. This makes the chances of attack, and even the possibility a large scale attack such as a worm, much greater.&lt;BR /&gt;&lt;BR /&gt;Due to the fact that Apache is the most deployed web server software on the Internet, detecting and patching this vulnerability is critical for many administrators. eEye has created a free tool that IT administrators can use to scan their networks for vulnerable Apache servers. The tool also provides a link to information on how to correctly patch vulnerable servers.&lt;BR /&gt;&lt;BR /&gt;To learn more about the free scanning tool visit:&lt;BR /&gt;&lt;A href="http://www.eeye.com/html/Research/Tools/apachechunked.html" target="_blank"&gt;http://www.eeye.com/html/Research/Tools/apachechunked.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Note: A recent update to eEye's Retina Network Security Scanner included an audit for this particular Apache vulnerability. Retina users should be sure to run an "Auto-Update" to obtain this and other new vulnerability checks.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;SUBSCRIPTION INFORMATION&lt;BR /&gt;&lt;BR /&gt;You are receiving this email as a valued user of eEye products. If you wish to be removed from the mailing list, please go to &lt;A href="http://www.eeye.com/html/forms/unsubscribe.asp?list=Blast." target="_blank"&gt;http://www.eeye.com/html/forms/unsubscribe.asp?list=Blast.&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 21 Jun 2002 14:35:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749796#M69881</guid>
      <dc:creator>someone_4</dc:creator>
      <dc:date>2002-06-21T14:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Web Server Chunk Handling Vulnerability ?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749797#M69882</link>
      <description>I'm trying to build apache-1.3.26&lt;BR /&gt;on a HP-UX 11 host&lt;BR /&gt;&lt;BR /&gt;I'm getting the following error.&lt;BR /&gt; (only used --prefix at the &lt;BR /&gt;configure stage) &lt;BR /&gt;&lt;BR /&gt;/usr/local/src/apache_1.3.26-&amp;gt; ./configure --prefix=/opt/apache&lt;BR /&gt;Configuring for Apache, Version 1.3.26&lt;BR /&gt; + using installation path layout: Apache (config.layout)&lt;BR /&gt;Creating Makefile&lt;BR /&gt;Creating Configuration.apaci in src&lt;BR /&gt;Creating Makefile in src&lt;BR /&gt; + configured for HP-UX 11 platform&lt;BR /&gt; + setting C compiler to gcc&lt;BR /&gt; + setting C pre-processor to gcc -E&lt;BR /&gt; + checking for system header files&lt;BR /&gt; + adding selected modules&lt;BR /&gt; + using builtin Expat&lt;BR /&gt; + checking sizeof various data types&lt;BR /&gt; + doing sanity check on compiler and options&lt;BR /&gt;Creating Makefile in src/support&lt;BR /&gt;Creating Makefile in src/regex&lt;BR /&gt;Creating Makefile in src/os/unix&lt;BR /&gt;Creating Makefile in src/ap&lt;BR /&gt;Creating Makefile in src/main&lt;BR /&gt;Creating Makefile in src/lib/expat-lite&lt;BR /&gt;Creating Makefile in src/modules/standard&lt;BR /&gt;-------------&lt;BR /&gt;that works now the make fails&lt;BR /&gt;--------------&lt;BR /&gt;make&lt;BR /&gt;===&amp;gt; src&lt;BR /&gt;make[1]: Entering directory `/opt/app/ULOC-SRC/apache_1.3.26'&lt;BR /&gt;make[2]: Entering directory `/opt/app/ULOC-SRC/apache_1.3.26/src'&lt;BR /&gt;===&amp;gt; src/regex&lt;BR /&gt;make[3]: Nothing to be done for `all'.&lt;BR /&gt;&amp;lt;=== src/regex&lt;BR /&gt;===&amp;gt; src/os/unix&lt;BR /&gt;gcc -c  -I../../os/unix -I../../include   -DHPUX11 -DUSE_HSREGEX -DUSE_EXPAT -I../../lib/expat-lite -DNO_DL_NEEDED `../../apaci` os.c&lt;BR /&gt;In file included from ../../include/ap_config.h:1121,&lt;BR /&gt;                 from os.c:6:&lt;BR /&gt;/usr/include/sys/socket.h:439: parse error before "sendfile"&lt;BR /&gt;/usr/include/sys/socket.h:439: parse error before "bsize_t"&lt;BR /&gt;/usr/include/sys/socket.h:441: parse error before "sendpath"&lt;BR /&gt;/usr/include/sys/socket.h:441: parse error before "bsize_t"&lt;BR /&gt;make[3]: *** [os.o] Error 1&lt;BR /&gt;make[2]: *** [subdirs] Error 1&lt;BR /&gt;make[2]: Leaving directory `/opt/app/ULOC-SRC/apache_1.3.26/src'&lt;BR /&gt;make[1]: *** [build-std] Error 2&lt;BR /&gt;make[1]: Leaving directory `/opt/app/ULOC-SRC/apache_1.3.26'&lt;BR /&gt;make: *** [build] Error 2&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Any Ideas?? &lt;BR /&gt;&lt;BR /&gt;thanks&lt;BR /&gt;John</description>
      <pubDate>Fri, 21 Jun 2002 17:45:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749797#M69882</guid>
      <dc:creator>John Ott</dc:creator>
      <dc:date>2002-06-21T17:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Web Server Chunk Handling Vulnerability ?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749798#M69883</link>
      <description>&lt;A href="http://www.cert.org/advisories/CA-2002-17.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2002-17.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This article states, that with regards to HP, "...Patches are in process and will be announced in an HP Security Bulletin when available."&lt;BR /&gt;&lt;BR /&gt;Has anyone heard anything relating to HPUX 11.xx?? &lt;BR /&gt;</description>
      <pubDate>Tue, 09 Jul 2002 12:48:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749798#M69883</guid>
      <dc:creator>VINCENT SPURGEON</dc:creator>
      <dc:date>2002-07-09T12:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Web Server Chunk Handling Vulnerability ?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749799#M69884</link>
      <description>&lt;BR /&gt;You need to address this issue:&lt;BR /&gt;&lt;BR /&gt;This member has assigned points to 23 of 132 responses to his/her questions.&lt;BR /&gt;&lt;BR /&gt;a big 17.4 %&lt;BR /&gt;&lt;BR /&gt;click on this and bring your results up:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/TopSolutions/1,,CA79166!1!questions,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/TopSolutions/1,,CA79166!1!questions,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Tue, 09 Jul 2002 13:37:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749799#M69884</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-07-09T13:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Web Server Chunk Handling Vulnerability ?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749800#M69885</link>
      <description>This was released by HP within the last week.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;SOLUTION: For HP-UX releases 11.00 and 11.11, download new product &lt;BR /&gt;          bundles from the ftp site below. &lt;BR /&gt;&lt;BR /&gt;MANUAL ACTIONS: Install repaired binary &lt;BR /&gt;&lt;BR /&gt;AVAILABILITY: Complete product bundles are available now for 11.00 &lt;BR /&gt;              and 11.11 are available for PA-RISC architecture &lt;BR /&gt;              platforms via ftp at hprc.external.hp.com  (see below &lt;BR /&gt;              for account details).&lt;BR /&gt;&lt;BR /&gt; ------------------------------------------------------------------&lt;BR /&gt;A. Background&lt;BR /&gt;    The CERT Advisory CA-2002-17 regarding Apache affects the &lt;BR /&gt;    following HP product numbers:&lt;BR /&gt;&lt;BR /&gt;    B9416AA Apache 2.x   PA-RISC HP-UX releases 11.00 and 11.11 &lt;BR /&gt;    B9415AA Apache 1.3.x PA-RISC HP-UX releases 11.00 and 11.11 &lt;BR /&gt;&lt;BR /&gt;    HP Apache 1.3.26 (PA-RISC)&lt;BR /&gt;    installs into /opt/apache and /opt/tomcat&lt;BR /&gt;    disk space: 55-65 MB&lt;BR /&gt;    documents:  /opt/apache/htdocs/doc&lt;BR /&gt;&lt;BR /&gt;    HP Apache 2.0.39 (PA-RISC)&lt;BR /&gt;    installs into /opt/hpapache2&lt;BR /&gt;    disk space: 80-90 MB&lt;BR /&gt;    documents:  /opt/hpapache2/hp_apache_docs&lt;BR /&gt;&lt;BR /&gt;    HP Apache automatically starts upon installation if port 80 &lt;BR /&gt;    is available.&lt;BR /&gt;&lt;BR /&gt;    Installation of this new version of HP Apache over an existing&lt;BR /&gt;    HP Apache installation is supported, while installation over a&lt;BR /&gt;    non-HP Apache is NOT supported.&lt;BR /&gt;&lt;BR /&gt;B. Fixing the problem&lt;BR /&gt;   The fixes for HP-UX 11.00 and 11.11 are in the form of new&lt;BR /&gt;   product bundles, instead of patches.  An ftp server account has&lt;BR /&gt;   been created to enable timely downloading of these binaries.&lt;BR /&gt;&lt;BR /&gt;     System:    hprc.external.hp.com  &lt;BR /&gt;&lt;BR /&gt;    FTP Access: ftp://apache:apache@hprc.external.hp.com/&lt;BR /&gt;            or: ftp://apache:apache@192.170.19.51/&lt;BR /&gt;&lt;BR /&gt;   Retrieve the binaries and verify the correct size, cksum output &lt;BR /&gt;   and MD5 fingerprint.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 09 Jul 2002 15:35:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749800#M69885</guid>
      <dc:creator>Kathleen</dc:creator>
      <dc:date>2002-07-09T15:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Web Server Chunk Handling Vulnerability ?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749801#M69886</link>
      <description>As a note there were two revisions made to the security bulletin:&lt;BR /&gt;&lt;BR /&gt;CHANGE SUMMARY: Rev.01 -  Do not install the bundle on NNM.&lt;BR /&gt;                Rev.02 -  Added Virtualvault patches.&lt;BR /&gt;</description>
      <pubDate>Tue, 09 Jul 2002 19:48:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749801#M69886</guid>
      <dc:creator>Daimian Woznick</dc:creator>
      <dc:date>2002-07-09T19:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Web Server Chunk Handling Vulnerability ?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749802#M69887</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You are using the gcc compiler.&lt;BR /&gt;&lt;BR /&gt;I had the similar problem and got it resolved using ansic C compiler.&lt;BR /&gt;&lt;BR /&gt;if you have anci C compiler then try the following before &lt;BR /&gt;running configure&lt;BR /&gt;&lt;BR /&gt;# export CC=/opt/ansic/bin/cc&lt;BR /&gt;&lt;BR /&gt;# ./configure --prefix=/opt/apache&lt;BR /&gt;&lt;BR /&gt;I am sure it will work.&lt;BR /&gt;&lt;BR /&gt;-Niraj</description>
      <pubDate>Wed, 10 Jul 2002 02:53:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-web-server-chunk-handling-vulnerability/m-p/2749802#M69887</guid>
      <dc:creator>Niraj Kumar Verma</dc:creator>
      <dc:date>2002-07-10T02:53:38Z</dc:date>
    </item>
  </channel>
</rss>

