"Last Friday (April 26), ESET and Sucuri simultaneously blogged about the
discovery of Linux/Cdorked, a backdoor impacting Apache servers running
cPanel." -http://blogs.cisco.com/security/linuxcdorked-faqs/

So it looks like an cPanel application vulnerability, not an Apache
vulnerability. The title of that first article in simple WRONG.
And seriously, who manages a site via cPanel? If you use cPanel, maybe
linux isn't a good fit for you.


On 2/05/13 7:48 PM, "Brian Burch" <br...@pingtoo.com> wrote:

>On 02/05/13 09:32, André Warnier wrote:
>> M Eashwar wrote:
>>> Hi,
>>>
>>>    Anyone attacked with reference to below URL?
>>>
>>> 
>>>http://efytimes.com/e1/fullnews.asp?edid=105167&ntype=mor&edate=4/29/201
>>>3
>>>
>>
>> Never heard of "EFYtimes" before, but considering what I have been
>> reading lately about bots, I would advise a modicum of caution before
>> following this link.
>> (And also maybe a modicum of healthy scepticism about that news article
>> itself).
>
>This vulnerability applies only to apache httpd and is not relevant to
>tomcat.
>
>ALSO, it only applies to apache httpd when installed via a third-party
>automated management system that is reported to not verify the digital
>signature of the binary... which would be very negligent.
>
>You should always verify apache packages against the published
>signatures. Although linux distribution rpm and deb packages are
>automatically verified during installation, we strongly recommend
>installing packages directly from the official apache distribution
>servers and then verifying the signature yourself - prior to installation!
>
>Regards,
>
>Brian
>
>---------------------------------------------------------------------
>To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>For additional commands, e-mail: users-h...@tomcat.apache.org
>


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to