Date: Sun, 30 Jun 2002 07:54:45 -0700 From: Kent Stewart <kstewart@owt.com> To: Benjamin Krueger <benjamin@seattleFenix.net> Cc: Andy Farkas <andyf@speednet.com.au>, security@FreeBSD.ORG Subject: Re: FreeBSD.Scalper.Worm Message-ID: <3D1F1BB5.6040807@owt.com> References: <3D1E9CDD.6050507@owt.com> <Pine.BSF.4.33.0206302244150.42445-100000@backup.af.speednet.com.au> <20020630071803.B23168@mail.seattleFenix.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Benjamin Krueger wrote: > * Andy Farkas (andyf@speednet.com.au) [020630 05:51]: > >>On Sat, 29 Jun 2002, Kent Stewart wrote: >> >> >>>One of the people sending mail to -docs, pointed me to >>> >>>http://securityresponse.symantec.com/avcenter/venc/data/freebsd.scalper.worm.html >>> >>>It looks like more exposure needs to be provided via the web site and etc. >>> >>>Kent >>> >>> >>Looks like this worm can be stopped by having /tmp mounted noexec. >> > > Or running a non-vulnerable version of Apache. That was my choice. I also upgraded from 1.3.24 to 2.0.39. I figured that it was time. I checked with people I knew and one of them had not upgraded Apache. He had waited until an application to take andvantage of Apache's hole and targeting FreeBSD had arrived. I figure there are more. Kent. -- Kent Stewart Richland, WA http://users.owt.com/kstewart/index.html To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3D1F1BB5.6040807>