<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Range header DoS vulnerability Apache HTTPD 1.3/2.x \(CVE-2011-3192\ in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/range-header-dos-vulnerability-apache-httpd-1-3-2-x-cve-2011/m-p/20637#M15068</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you chech this in Application &amp;amp; Theat Research Center:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://live.paloaltonetworks.com/message/8747#8747"&gt;https://live.paloaltonetworks.com/message/8747#8747&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see that isn´t supported yet CVE-2011-3192&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Aug 2011 10:23:31 GMT</pubDate>
    <dc:creator>exclusive</dc:creator>
    <dc:date>2011-08-29T10:23:31Z</dc:date>
    <item>
      <title>Range header DoS vulnerability Apache HTTPD 1.3/2.x \(CVE-2011-3192\</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/range-header-dos-vulnerability-apache-httpd-1-3-2-x-cve-2011/m-p/20636#M15067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/browser"&gt;CVE-2011-3192&lt;/A&gt; Was published yesterday.&amp;nbsp; Are there any mitigation steps I can make in the PaloAlto until they release a vulnerability update?&lt;/P&gt;&lt;P&gt;&lt;A href="http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/browser"&gt;http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/browser&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 14:37:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/range-header-dos-vulnerability-apache-httpd-1-3-2-x-cve-2011/m-p/20636#M15067</guid>
      <dc:creator>kirvin1</dc:creator>
      <dc:date>2011-08-25T14:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: Range header DoS vulnerability Apache HTTPD 1.3/2.x \(CVE-2011-3192\</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/range-header-dos-vulnerability-apache-httpd-1-3-2-x-cve-2011/m-p/20637#M15068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you chech this in Application &amp;amp; Theat Research Center:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://live.paloaltonetworks.com/message/8747#8747"&gt;https://live.paloaltonetworks.com/message/8747#8747&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see that isn´t supported yet CVE-2011-3192&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2011 10:23:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/range-header-dos-vulnerability-apache-httpd-1-3-2-x-cve-2011/m-p/20637#M15068</guid>
      <dc:creator>exclusive</dc:creator>
      <dc:date>2011-08-29T10:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: Range header DoS vulnerability Apache HTTPD 1.3/2.x \(CVE-2011-3192\</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/range-header-dos-vulnerability-apache-httpd-1-3-2-x-cve-2011/m-p/20638#M15069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are targeting to release a vulnerability signature to cover this tomorrow. In the mean time, here are some recommended mitigation steps that we have found:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3C20110824161640.122D387DD@minotaur.apache.org%3E"&gt;http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3C20110824161640.122D387DD@minotaur.apache.org%3E&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.edwiget.name/2011/08/quick-fix-for-apache-cve-2011-3192/"&gt;http://www.edwiget.name/2011/08/quick-fix-for-apache-cve-2011-3192/&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alfred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Aug 2011 16:28:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/range-header-dos-vulnerability-apache-httpd-1-3-2-x-cve-2011/m-p/20638#M15069</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2011-08-29T16:28:43Z</dc:date>
    </item>
  </channel>
</rss>

