Package: fail2ban
Version: 0.6.1-1
Severity: wishlist

It would be nice to add to the Apache attacks section, the detection of the 
attacks on the xmlrpc vulnerability used by Linux.Plupii.C virus
concerning the files :
/Ads/adxmlrpc.php 
/a1b2c3d4e5f6g7h8i9/nonexistentfile.php 
/ads/adxmlrpc.php 
/adserver/adxmlrpc.php 
/adxmlrpc.php 
/b2/xmlsrv/xmlrpc.php 
/b2evo/xmlsrv/xmlrpc.php 
/blog/xmlrpc.php 
/blog/xmlsrv/xmlrpc.php 
/blogs/xmlrpc.php 
/blogs/xmlsrv/xmlrpc.php 
/blogtest/xmlsrv/xmlrpc.php 
/community/xmlrpc.php 
/drupal/xmlrpc.php 
/phpAdsNew/adxmlrpc.php 
/phpads/adxmlrpc.php 
/phpadsnew/adxmlrpc.php 
/phpgroupware/xmlrpc.php 
/wordpress/xmlrpc.php 
/xmlrpc.php 
/xmlrpc/xmlrpc.php 
/xmlsrv/xmlrpc.php 

-- System Information:
Debian Release: testing/unstable
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.20
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages fail2ban depends on:
ii  iptables                      1.3.3-2    Linux kernel 2.4+ iptables adminis
ii  python                        2.3.5-5    An interactive high-level object-o

fail2ban recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to