www.openwall.com Open in urlscan Pro
193.110.157.242  Public Scan

Submitted URL: http://www.openwall.com/lists/oss-security/2012/08/22/7
Effective URL: https://www.openwall.com/lists/oss-security/2012/08/22/7
Submission: On July 19 via api from TR — Scanned from NL

Form analysis 0 forms found in the DOM

Text Content

 * Products
   * Openwall GNU/*/Linux   server OS
   * Linux Kernel Runtime Guard
   * John the Ripper   password cracker
     * Free & Open Source for any platform
     * in the cloud
     * Pro for Linux
     * Pro for macOS
   * Wordlists   for password cracking
   * passwdqc   policy enforcement
     * Free & Open Source for Unix
     * Pro for Windows (Active Directory)
   * yescrypt   KDF & password hashing
   * yespower   Proof-of-Work (PoW)
   * crypt_blowfish   password hashing
   * phpass   ditto in PHP
   * tcb   better password shadowing
   * Pluggable Authentication Modules
   * scanlogd   port scan detector
   * popa3d   tiny POP3 daemon
   * blists   web interface to mailing lists
   * msulogin   single user mode login
   * php_mt_seed   mt_rand() cracker
 * Services
 * Publications
   * Articles
   * Presentations
 * Resources
   * Mailing lists
   * Community wiki
   * Source code repositories (GitHub)
   * Source code repositories (CVSweb)
   * File archive & mirrors
   * How to verify digital signatures
   * OVE IDs
 * What's new

Follow @Openwall on Twitter for new release announcements and other news

[<prev] [next>] [<thread-prev] [day] [month] [year] [list]

Date: Wed, 22 Aug 2012 12:11:05 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Thijs Kinkhorst <thijs@...ian.org>
Subject: Re: CVE Request: Apache mod RPAF denial of service

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/22/2012 03:57 AM, Thijs Kinkhorst wrote:
> Hi,
> 
> Sébastien Bocahu reported to the Debian security team a denial of
> service issue in the Apache module RPAF (reverse proxy add
> forward).
> 
> http://bugs.debian.org/683984
> 
> Version 0.6 is not affected, 0.5 is and we've released a security
> update for that. Can someone please assign a CVE id to this issue?
> 
> 
> Thanks, Thijs

Please use CVE-2012-3526 for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=MX/G
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to
this mailing list.

Confused about mailing lists and their use? Read about mailing lists on
Wikipedia and check out these guidelines on proper formatting of your messages.