News

Apache Flaw Affects Windows Implementations

A security company released information this week about what it calls an "extremely high risk" vulnerability involving the Apache open source Web server running on non-Unix platforms, such as Windows.

The vulnerability affects Apache 2.0 Server Software, according to its discoverers at PivX Solutions of Newport Beach, Calif. The vulnerability could allow attackers to damage a server and reveal sensitive data, according to the security company.

The flaw affects default installations of the Apache Web server in non-Unix platforms like Windows, IBM OS/2 and Novell Netware. The flaw does not appear to affect Unix or Linux platforms.

PivX notified the Apache Software Foundation, which maintains the open source Apache code, and the foundation produced a fixed version within 24 hours. The vulnerability and several other less serious security holes are patched in Apache 2.0.40.

Meanwhile, PivX also has a workaround for users, which is available at www.pivx.com.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Windows 10 Mobile To Fall Out of Support in December

    Microsoft will end support for the Windows 10 Mobile operating system on Dec. 10, 2019, according to an announcement.

  • Get More Out of Your Outlook Inbox with TakeNote

    Brien comes across a handy, but imperfect, feature in Outlook that lets you annotate specific e-mails. Its provenance is something of a mystery, though.

  • Microsoft Resumes Rerelease of Windows 10 Version 1809

    Microsoft on Wednesday once more resumed its general rollout of the Windows 10 version 1809 upgrade, also known as the "October 2018 Update."

  • Microsoft Ups Its Windows 10 App Compatibility Assurances

    Microsoft gave assurances this week that organizations adopting Windows 10 likely won't face application compatibility issues.

comments powered by Disqus
Most   Popular

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.