Date: Fri, 28 Jun 2002 12:31:34 -0400 From: Mike Tancsa <mike@sentex.net> To: flynn@energyhq.homeip.net Cc: freebsd-security@FreeBSD.ORG Subject: Re: Apache worm in the wild Message-ID: <5.1.0.14.0.20020628123102.041e17a0@marble.sentex.ca> In-Reply-To: <20020628113834.GA10062@energyhq.homeip.net> References: <20020628125817.O68824-100000@axis.tdd.lt> <20020628125817.O68824-100000@axis.tdd.lt>
next in thread | previous in thread | raw e-mail | index | archive | help
At 01:38 PM 28/06/2002 +0200, flynn@energyhq.homeip.net wrote: >On Fri, Jun 28, 2002 at 01:01:32PM +0200, Domas Mituzas wrote: > >Hi, > > > our honeypot systems trapped new apache worm(+trojan) in the wild. It > > traverses through the net, and installs itself on all vulnerable apaches > > it finds. No source code available yet, but I put the binaries into public > >Wow, an interesting puppy. I just ran it through dasm to get the >assembler dump. The executable is not even stripped, and makes an Hi, Is this aimed at all OSes are just FreeBSD ? ---Mike To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20020628123102.041e17a0>