-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mark,

On 11/27/12 4:23 AM, Mark Thomas wrote:
> On 27/11/2012 07:21, Mohan Kumar G wrote:
>> 
>> We have found the malware installed on the tomcat version 6.0.29
>> on two of the servers.The both servers have a war file 
>> (Tomcatmanagxesaxsas.war) that installed several java script
>> files to the Tomcat webserver that allow for remote access over
>> the web. OD-VA-W-AG-87 had an additional war file (Jeroy.war)
>> that appears to also be a java script remote file browser.
> 
> Could you send copies of those WAR files to
> secur...@tomcat.apache.org please.
> 
>> Even though , we followed all the security settings needed for 
>> the tomcat container.
> 
> You are running a 2 year old version of Tomcat 6.0.x with multiple
> known security vulnerabilities. There are several vulnerabilities
> that could have provided an attacker with the necessary foothold to
> start an attack.

+1

There are also plenty of ways that the attacker could have gotten
access to the system through other means, and then installed the WAR
file for an easier return.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iEYEARECAAYFAlC1RuMACgkQ9CaO5/Lv0PDvGwCeMY+/GIdMNWP4JvUx0g7cRUkx
6PUAnAnGXMEiNYJudgm4JeewjgEAEtxh
=31JE
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to