Date: Sat, 22 Jun 2002 16:57:36 -0600 From: Brett Glass <brett@lariat.org> To: <jps@funeralexchange.com>, <kzaraska@student.uci.agh.edu.pl> Cc: <freebsd-security@FreeBSD.ORG> Subject: Re: Apache FreeBSD exploit released Message-ID: <4.3.2.7.2.20020622165052.02209380@localhost> In-Reply-To: <3177.66.171.47.179.1024786088.squirrel@webmail.allneo.com> References: <20020622125713.547c2546.kzaraska@student.uci.agh.edu.pl> <20020622125713.547c2546.kzaraska@student.uci.agh.edu.pl>
next in thread | previous in thread | raw e-mail | index | archive | help
At 04:48 PM 6/22/2002, jps@funeralexchange.com wrote: >Anyone know of any ports or tools i could use on my servers to watch out >for something like this? You can probably use some of the ideas I presented at the January BSDCon. Either the Apache SetEnvIf regexes or the SNOBOL log monitor will work for this one. See http://www.brettglass.com/logmonitors/paper.html for more. --Brett P.S. -- I'm still working on the replacement logging system mentioned in that paper. It has an entirely new architecture; the hard part has been backward compatibility with older Unices and with programs that expect to communicate with syslogd. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20020622165052.02209380>