Michael Schröpl: Apache 1.3.24 released

Beitrag lesen

Hi nochmal,

#      Fix the security vulnerability noted in CAN-2002-0061 (mitre.org)
#      regarding the escaping of command line args on Win32.

machen wir mal schnell noch den link rein:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0061

"Apache for Win32 before 1.3.24, and 2.0.x before

#  2.0.34-beta, allows remote attackers to execute

arbitrary commands via shell metacharacters

(a | pipe character) provided as arguments to batch

(.bat) or .cmd scripts, which are sent unfiltered

to the shell interpreter, typically cmd.exe."

Viele Grüße
      Michael