Je hebt een klacht over de onderstaande posting:
In Apache 1.3 the issue causes a stack overflow. Due to the nature of the overflow on 32-bit Unix platforms this will cause a segmentation violation and the child will terminate. However on 64-bit platforms the overflow can be controlled and so for platforms that store return addresses on the stack it is likely that it is further exploitable. This could allow arbitrary code to be run on the server as the user the Apache children are set to run as. Nou nou hoeveel mensen zullen hier last van hebben. Blazen jullie het nieuws altijd zo op ?
Beschrijf je klacht (Optioneel):