[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Apache security compromise



[Sun Jul  7 06:26:28 2002] [notice] Apache/1.3.26 (Unix) Debian GNU/Linux 
PHP/4.1.2 configured -- resuming normal operations
[Sun Jul  7 06:26:28 2002] [notice] suEXEC mechanism enabled (wrapper: 
/usr/lib/apache/suexec)
[Sun Jul  7 06:26:28 2002] [notice] Accept mutex: sysvsem (Default: sysvsem)
[Sun Jul  7 07:31:05 2002] [error] [client 65.213.188.190] client sent 
HTTP/1.1
request without hostname (see RFC2616 section 14.23): /

This is from my apache.log ... i don't know exactly what they mean, but the 
suEXEC mechanism enabled line does not sound good. I hope someone knows what 
it could be, and if it is bad, what can i do to prevent it.

Rx


-- 
To UNSUBSCRIBE, email to debian-user-request@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org



Reply to: