Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 28 Jun 2002 12:31:34 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        flynn@energyhq.homeip.net
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Apache worm in the wild
Message-ID:  <5.1.0.14.0.20020628123102.041e17a0@marble.sentex.ca>
In-Reply-To: <20020628113834.GA10062@energyhq.homeip.net>
References:  <20020628125817.O68824-100000@axis.tdd.lt> <20020628125817.O68824-100000@axis.tdd.lt>

next in thread | previous in thread | raw e-mail | index | archive | help
At 01:38 PM 28/06/2002 +0200, flynn@energyhq.homeip.net wrote:
>On Fri, Jun 28, 2002 at 01:01:32PM +0200, Domas Mituzas wrote:
>
>Hi,
>
> > our honeypot systems trapped new apache worm(+trojan) in the wild. It
> > traverses through the net, and installs itself on all vulnerable apaches
> > it finds. No source code available yet, but I put the binaries into public
>
>Wow, an interesting puppy. I just ran it through dasm to get the
>assembler dump. The executable is not even stripped, and makes an


Hi,
         Is this aimed at all OSes are just FreeBSD ?

         ---Mike


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20020628123102.041e17a0>