On Sun, 12 Dec 2004, Marek Podmaka wrote:
So is there any solution for this? We can't use safe_mode in php,
it's too restrictive for most customers. We use postfix (default
version in woody)
A couple of thoughts:
1. Transparently proxy SMTP to your an MTA you control, which limits the
number o
On Sunday 12 December 2004 17:46, Marek Podmaka wrote:
> I don't want to give hints on how to exploit this, but the attacker
> did wget the .tgz file, unpacked it in /tmp and run the program.
>
> So update all your phpBB installations ASAP (and of course all
> installations of your customer
Hello debian-isp,
maybe little off-topic, but I want to remind you of this phpBB
vulnerability, which is fixed in version 2.0.11 (announced on 18th
November) which "addresses a potentially serious exploit".
I am writing this because it's not potentional, but real. Before 2
weeks, someon
Hi!
Few days earlier one of our customers sent about 90.000 mails using
mail() function in php and that's bad... Fortunately most of them
stayed in mail queue, but I have been lucky to notice it early.
All those mails were for about 4 different addresses, 2 of them
wrote us complaints.
4 matches
Mail list logo