On 02/05/2013 12:29, Jess Holle wrote:
> http://blogs.cisco.com/security/linuxcdorked-faqs/ claims this is not a
> cPanel vulnerability per se...

To quote the relevant part of that article:

<quote>
How are attackers gaining access to the host servers?
How the attackers are gaining root access to begin with is a separate
matter, still unresolved. Attackers may have stolen login credentials
via phishing, or via a localized infection on a management system, or
simply by brute-force guessing the login.
</quote>

httpd is simply the vehicle the attackers are using to run their malware
*once they already have root access*

There is no Apache http vulnerability to see here. Move along. Move along.

Mark


> 
> On 5/2/2013 6:22 AM, Darryl Lewis wrote:
>> "Last Friday (April 26), ESET and Sucuri simultaneously blogged about the
>> discovery of Linux/Cdorked, a backdoor impacting Apache servers running
>> cPanel." -http://blogs.cisco.com/security/linuxcdorked-faqs/
>>
>> So it looks like an cPanel application vulnerability, not an Apache
>> vulnerability. The title of that first article in simple WRONG.
>> And seriously, who manages a site via cPanel? If you use cPanel, maybe
>> linux isn't a good fit for you.
>>
>>
>> On 2/05/13 7:48 PM, "Brian Burch" <br...@pingtoo.com> wrote:
>>
>>> On 02/05/13 09:32, André Warnier wrote:
>>>> M Eashwar wrote:
>>>>> Hi,
>>>>>
>>>>>     Anyone attacked with reference to below URL?
>>>>>
>>>>>
>>>>> http://efytimes.com/e1/fullnews.asp?edid=105167&ntype=mor&edate=4/29/201
>>>>>
>>>>> 3
>>>>>
>>>> Never heard of "EFYtimes" before, but considering what I have been
>>>> reading lately about bots, I would advise a modicum of caution before
>>>> following this link.
>>>> (And also maybe a modicum of healthy scepticism about that news article
>>>> itself).
>>> This vulnerability applies only to apache httpd and is not relevant to
>>> tomcat.
>>>
>>> ALSO, it only applies to apache httpd when installed via a third-party
>>> automated management system that is reported to not verify the digital
>>> signature of the binary... which would be very negligent.
>>>
>>> You should always verify apache packages against the published
>>> signatures. Although linux distribution rpm and deb packages are
>>> automatically verified during installation, we strongly recommend
>>> installing packages directly from the official apache distribution
>>> servers and then verifying the signature yourself - prior to
>>> installation!
>>>
>>> Regards,
>>>
>>> Brian
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>>> For additional commands, e-mail: users-h...@tomcat.apache.org
>>>
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>> For additional commands, e-mail: users-h...@tomcat.apache.org
>>
>> .
>>
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to