Date: Wed, 15 Aug 2007 13:08:56 -0400 From: Arie Kachler <akachler@telcom.net> To: FreeBSD ISP <freebsd-isp@freebsd.org> Subject: security question Message-ID: <46C33328.6050700@telcom.net>
next in thread | raw e-mail | index | archive | help
Hello, This may not be the best place to ask, but I know all readers of this list have security experience (we have no other choice). We have many Freebsd servers with apache/php/mysql. Recently, some of these have been sending out large amounts of emails. We know the servers are secure in the sense they are fully patched. But we also know that the most secure shared server can be abused by a badly written php script. So my question is this: Is there a way to identify vulenrable php scripts? It's very difficult to pinpoint when the server starts sending out emails. We just notice that they do, without any identifyable correlation to anything on the logs. A related question: Can we audit which php script is calling sendmail? Any advice will be greatly appreciated. Arie Kachler Systems Administrator Telcom.Net
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?46C33328.6050700>