Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Aftermath: people, running Debian httpd 2.4.66, started complaining when they’ll get the 2.4.67 update to fix this RCE vulnerability.

Aftermath: people, running Debian httpd 2.4.66, started complaining when they’ll get the 2.4.67 update to fix this RCE vulnerability.

Scheduled Pinned Locked Moved Uncategorized
cve202623918
3 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tychotithonus@infosec.exchangeT This user is from outside of this forum
    tychotithonus@infosec.exchangeT This user is from outside of this forum
    tychotithonus@infosec.exchange
    wrote last edited by
    #1

    RE: https://chaos.social/@icing/116526903529846107

    Aftermath: people, running Debian httpd 2.4.66, started complaining when they’ll get the 2.4.67 update to fix this RCE vulnerability. Which they already were protected from, but did not know. Because the CVE was not public at the time the fix was shipped.

    [...]

    Two security researchers found the vulnerability independently. Just scanning the 2.4.66 source code. This means the bad guys can no longer be kept in the dark. Coordinated disclosure no longer works.

    #CVE_2026_23918

    davemwilburn@infosec.exchangeD 1 Reply Last reply
    0
    • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

      RE: https://chaos.social/@icing/116526903529846107

      Aftermath: people, running Debian httpd 2.4.66, started complaining when they’ll get the 2.4.67 update to fix this RCE vulnerability. Which they already were protected from, but did not know. Because the CVE was not public at the time the fix was shipped.

      [...]

      Two security researchers found the vulnerability independently. Just scanning the 2.4.66 source code. This means the bad guys can no longer be kept in the dark. Coordinated disclosure no longer works.

      #CVE_2026_23918

      davemwilburn@infosec.exchangeD This user is from outside of this forum
      davemwilburn@infosec.exchangeD This user is from outside of this forum
      davemwilburn@infosec.exchange
      wrote last edited by
      #2

      @tychotithonus

      Eh... This isn't a particularly new issue. Doesn't even require source code, either. Bindiff is a couple decades old at this point.

      Just because coordinated disclosure is hard and messy and flawed doesn't mean we should give up on the idea of protecting downstream users like the jerks behind the copy.fail disclosure did.

      tychotithonus@infosec.exchangeT 1 Reply Last reply
      0
      • davemwilburn@infosec.exchangeD davemwilburn@infosec.exchange

        @tychotithonus

        Eh... This isn't a particularly new issue. Doesn't even require source code, either. Bindiff is a couple decades old at this point.

        Just because coordinated disclosure is hard and messy and flawed doesn't mean we should give up on the idea of protecting downstream users like the jerks behind the copy.fail disclosure did.

        tychotithonus@infosec.exchangeT This user is from outside of this forum
        tychotithonus@infosec.exchangeT This user is from outside of this forum
        tychotithonus@infosec.exchange
        wrote last edited by
        #3

        @DaveMWilburn Not disagreeing - I think Eissing is using "responsible" here on purpose, rather than "coordinated"

        1 Reply Last reply
        1
        0
        • R relay@relay.infosec.exchange shared this topic
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups