Date: Fri, 28 Jun 2002 21:58:01 +0200 From: flynn@energyhq.homeip.net To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Apache worm in the wild Message-ID: <20020628195801.GB10200@energyhq.homeip.net> In-Reply-To: <5.1.0.14.0.20020628123102.041e17a0@marble.sentex.ca> References: <20020628125817.O68824-100000@axis.tdd.lt> <20020628125817.O68824-100000@axis.tdd.lt> <5.1.0.14.0.20020628123102.041e17a0@marble.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --]
On Fri, Jun 28, 2002 at 12:31:34PM -0400, Mike Tancsa wrote:
Hi,
> Is this aimed at all OSes are just FreeBSD ?
The elf binary is a FreeBSD one, so I assume this exploit will only work on
FreeBSD. I'm going to fully disect the code this weekend and post my
results on the list.
Cheers,
--
Miguel Mendez - flynn@energyhq.homeip.net
GPG Public Key :: http://energyhq.homeip.net/files/pubkey.txt
EnergyHQ :: http://www.energyhq.tk
Of course it runs NetBSD!
[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (NetBSD)
iD8DBQE9HL/JnLctrNyFFPERAlJNAJ9jNPfJ2BUjzgaPO5HNewTAjBvkWwCgoIct
JAnaOLH6haCdlg9KvuNOaqI=
=n02V
-----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020628195801.GB10200>
