Urgent! Apache block encoding Remote Overflow Vulnerability Attack Process

Source: Internet
Author: User
Tags apache error log
Urgent! For details, refer to Apache block encoding Remote Overflow Vulnerability Attack Process-general Linux technology-Linux technology and application information. Recently in the software interrupt, this is apache relatively large vulnerability, apache-scalp.c is found online test code, but the runtime prompt your browser sent a request that this server couldn't understand, apache error log prompts request failed: error reading the headers
(The command I entered is./2 1 0.0.0.0: 8080 (apache address)
I installed fedora10, apache1.3.41, and MySQL5.0.22)
Is there a problem with my parameters? Please give us some advice on the specific attack process or other attack methods of this attack code. Thank you!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.