lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <003c01c407dd$1b0229f0$5746370a@nsp.co.nz> From: venom at gen-x.co.nz (VeNoMouS) Subject: Apache 1.3.29 heh after the 10 or so emails i got stating almost the same thing i said it was a mates box, NOT MINE. how ever i did tell him to look at the logs and he did say there were alot of the following "\x80j\x01\x03\x01" but how can j be in there is what i dont get *shrug* ----- Original Message ----- From: "Cedric Blancher" <blancher@...tel-securite.fr> To: "VeNoMouS" <venom@...-x.co.nz> Cc: <full-disclosure@...ts.netsys.com> Sent: Friday, March 12, 2004 12:13 PM Subject: Re: [Full-Disclosure] Apache 1.3.29 > Le jeu 11/03/2004 ? 21:38, VeNoMouS a ?crit : > > any one know if theres a new exploit for apache 1.3.29 in the wild one > > of my mates boxes was breached this morning by ir4dex appears they > > gained axx via apache then got root via mmap() > > Have you checked PHP and CGI stuff to see if there was a way to > compromise the host using them ? They are often a valuable to gain a > unpriviledged shell on web server. > > -- > http://www.netexit.com/~sid/ > PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE > >> Hi! I'm your friendly neighbourhood signature virus. > >> Copy me to your signature file and help me spread! > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html >
Powered by blists - more mailing lists