home *** CD-ROM | disk | FTP | other *** search
Wrap
<!-- saved from url=(0022)http://internet.e-mail --> <!-- saved from url=(0022)http://internet.e-mail --> <!-- saved from url=(0022)http://internet.e-mail --> <html> <head> <meta http-equiv="Content-Language" content="en-us"> <meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> <title>Retina CodeRed Scanner Help</title> </head> <body> <P> <font face="Arial,Helvetica,sans-serif" size="2"> <font size="4">Retina Apache Chunked Scanner Help</font> <br><br><br> <b>Disclaimer</b> <br><br> There are no warranties for the Retina Apache Chunked Scanner. In no event shall the author be liable for any damages arising out of or in connection with the use of the Retina Apache Chunked Scanner. Any use of this program is at the user's own risk. <br><br> The scanner will properly identify Apache web servers vulnerable to the recent Chunked encoding buffer overflow attack. <a href="http://httpd.apache.org/info/security_bulletin_20020617.txt" target="_blank">http://httpd.apache.org/info/security_bulletin_20020617.txt</a></font></P> <P> <font face="Arial,Helvetica,sans-serif" size="2"> <b>How It Works</b> <br><br> The Retina Apache Chunked Scanner detects Apache servers which can be compromised by the Apache Chunked Encoding vulnerability . The scanner works by attempting to sending a small request that makes a vulnerable server to become unresponsive. As usually Apache runs with more than 1 process, there would be no down time while the test is performed.</font></P> <P> <font face="Arial,Helvetica,sans-serif" size="2"> <br> </font><FONT face=Arial><STRONG>To Secure Your Server</STRONG></FONT></P> <P><font face="Arial" size="2">Apache Software Foundation has released new versions of Apache to fix this vulnerability:<br> </font><a href="http://www.apache.org/dist/httpd/" target="_blank">http://www.apache.org/dist/httpd/</a></P> <P>The Apache Software Foundation has released versions 1.3.26 and 2.0.39 to address and fix this issue.<br> <FONT size=2><br><FONT face=Arial> <b>Response Codes:</b> </FONT></FONT></P> <UL> <li><FONT face=Arial><FONT size=2><font color="#ff0000">Vulnerable</font>: The server is running a version of Apache that is vulnerable to the chunked vulnerability. You must upgrade your server to the latest version of Apache.</FONT></FONT> <li><FONT face=Arial><FONT size=2><font color="#ff0000">Not Vulnerable</font>: The server is not vulnerable to the Chunked Encoding vulnerability.</FONT></FONT> </li> </UL> <P><FONT face=Arial><FONT size=2> <b>If You Experience Problems:</b> <br><br> Please run Iris (</FONT></FONT> <a href="http://www.eEye.com/Iris/"><FONT face=Arial size=2>www.eEye.com/Iris/</FONT></a><FONT face=Arial size=2>) and capture the session. We are happy to help analyze the data if needed -- send the captured session to </FONT> <A href="mailto:support@eEye.com"><FONT face=Arial size=2>support@eEye.com</FONT></a><FONT face=Arial size=2>. This will help us in fixing any bugs within the Retina Apache Chunked Scanner.</FONT></P> </body> </html>