{"id":67,"date":"2009-12-30T16:50:01","date_gmt":"2009-12-30T15:50:01","guid":{"rendered":"http:\/\/blog.pi3.com.pl\/?p=67"},"modified":"2009-12-30T16:50:01","modified_gmt":"2009-12-30T15:50:01","slug":"apache-vulnerability","status":"publish","type":"post","link":"https:\/\/blog.pi3.com.pl\/?p=67","title":{"rendered":"Apache vulnerability"},"content":{"rendered":"<p>This will be very short post&#8230; I have found (few months ago) security vulnerability in one of Apache server\/module. I contact with apache security team. After few days I will decide about &#8220;future&#8221; of this bug &#8211; publish or wait for security path and publish after it. Now I can paste here simple output from gdb:<\/p>\n<pre>Program received signal SIGSEGV, Segmentation fault.\r\n0x0000003fec682958 in memcpy () from \/lib64\/libc.so.6\r\nMissing separate debuginfos, use: debuginfo-install expat-2.0.1-6.fc11.1.x86_64 \r\nglibc-2.10.1-5.x86_64 nss-softokn-freebl-3.12.4-3.fc11.x86_64\r\n(gdb) bt\r\n#0  0x0000003fec682958 in memcpy () from \/lib64\/libc.so.6\r\n#1  0x000000000043083c in inet_addr ()\r\n#2  0x000000000042a796 in inet_addr ()\r\n#3  0x000000000042975f in inet_addr ()\r\n#4  0x000000000041d8f5 in inet_addr ()\r\n#5  0x0000000000432a29 in inet_addr ()\r\n#6  0x000000000044bc88 in inet_addr ()\r\n#7  0x000000000044bceb in inet_addr ()\r\n#8  0x0000000000441344 in inet_addr ()\r\n#9  0x0000000000441521 in inet_addr ()\r\n#10 0x00000000004416a7 in inet_addr ()\r\n#11 0x0000000000441f5f in inet_addr ()\r\n#12 0x0000000000442820 in inet_addr ()\r\n#13 0x0000003fec61ea2d in __libc_start_main () from \/lib64\/libc.so.6\r\n#14 0x0000000000403399 in inet_addr ()\r\n#15 0x00007fffffffe618 in ?? ()\r\n#16 0x000000000000001c in ?? ()\r\n#17 0x0000000000000002 in ?? ()\r\n#18 0x00007fffffffe87d in ?? ()\r\n#19 0x00007fffffffe899 in ?? ()\r\n#20 0x0000000000000000 in ?? ()<\/pre>\n<p>Best regards,<\/p>\n<p>Adam Zabrocki<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This will be very short post&#8230; I have found (few months ago) security vulnerability in one of Apache server\/module. I contact with apache security team. After few days I will decide about &#8220;future&#8221; of this bug &#8211; publish or wait for security path and publish after it. Now I can paste here simple output from [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-67","post","type-post","status-publish","format-standard","hentry","category-bughunt","category-exploiting"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/posts\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67"}],"version-history":[{"count":1,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/posts\/67\/revisions"}],"predecessor-version":[{"id":68,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=\/wp\/v2\/posts\/67\/revisions\/68"}],"wp:attachment":[{"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=67"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.pi3.com.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}