ftp/proftpd 1.3.3c with a version which contained a backdoor.
fidaj at ukr.net
Thu Dec 2 21:49:17 UTC 2010
В Thu, 2 Dec 2010 23:22:06 +0200
Ivan Klymenko <fidaj at ukr.net> пишет:
> Hello, people!
> What do you think is it worth to pay attention to these events:
> and that in this case needs to be done with the port ftp/proftpd
Check vulnerability of your server, you can by using the following
$ telnet 126.96.36.199 21
Connected to 188.8.131.52
Escape character is '^]'.
220 ProFTPD 1.3.3c Server (ProFTPD Default Installation) [184.108.40.206]
uid=0(root) gid=0(root) groups=0(root),65534(nogroup)
More information about the freebsd-ports