[<prev] [next>] [day] [month] [year] [list]
Message-ID: <846999505.20040224191952@SECURITY.NNOV.RU>
From: 3APA3A at SECURITY.NNOV.RU (3APA3A)
Subject: Scans for IPSwitch IMail LDAP vuilnerability
Dear full-disclosure@...ts.netsys.com,
Information was received from Kaspersky Labs, there is increased
activity on TCP/389 (LDAP) port. Analysis of captured packet
demonstrates attempt to exploit IPSwitch IMail LDAP vulnerability.
Packet contains universal reverse shell shellcode. Trojan is installed
on owned host (listens on TCP/21 and pretends to be wu-ftpd).
Best solution is to filter TCP/389.
--
http://www.security.nnov.ru
/\_/\
{ , . } |\
+--oQQo->{ ^ }<-----+ \
| ZARAZA U 3APA3A } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
|/
Powered by blists - more mailing lists