Date: Thu, 16 Sep 2010 11:34:19 -0400 From: Mike Jakubik <mike.jakubik@intertainservices.com> To: Ruslan Mahmatkhanov <cvs-src@yandex.ru> Cc: Dan Langille <dan@langille.org>, freebsd-ports@freebsd.org Subject: Re: www/openx vuln Message-ID: <1284651259.1660.3.camel@mjakubik-laptop> In-Reply-To: <4C92358A.8040704@yandex.ru> References: <4C9176BD.3020903@langille.org> <4C91A6A2.90602@yandex.ru> <afbcc6497518577c28219c95c1e86ab4.squirrel@nyi.unixathome.org> <4C92358A.8040704@yandex.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
The risk is real, my own server was compromised yesterday. http://news.softpedia.com/news/Unpatched-OpenX-Vulnerability-Exploited-to-Compromise-Multiple-Ad-Servers-156402.shtml I am in the process of creating an updated port, should file a pr soon, but it should be marked as forbidden until then. On Thu, 2010-09-16 at 19:19 +0400, Ruslan Mahmatkhanov wrote: > 16.09.2010 17:59, Dan Langille пишет: > > > > On Thu, September 16, 2010 1:09 am, Ruslan Mahmatkhanov wrote: > >> 16.09.2010 05:45, Dan Langille пишет: > >>> This came in last night: http://blog.openx.org/09/security-update/ > >>> > >>> Port needs to be upgraded to 2.8.8 and a vuln entry created.... Sorry, > >>> bags not me. > >>> > >> > >> Until update is not come up, user can apply this workaround: > >> > >> echo "RemoveType .php"> www/images/.htaccess > > > > Do you have a reference for this fix? A URL we can refer people to? > > Not really, but i read there (originally in Russian): > > http://translate.google.com/translate?js=n&prev=_t&hl=ru&ie=UTF-8&layout=2&eotf=0&sl=ru&tl=en&u=http%3A%2F%2Fwww.opennet.ru%2Fopennews%2Fart.shtml%3Fnum%3D27971 > > that vulnerable plugin allows to attacker upload php-file into images > dir and that disabling handling php in that directory via RemoveHandler > or RemoveType successfully closes the bug. >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1284651259.1660.3.camel>