Package: fail2ban Version: 0.6.1-1 Severity: wishlist It would be nice to add to the Apache attacks section, the detection of the attacks on the xmlrpc vulnerability used by Linux.Plupii.C virus concerning the files : /Ads/adxmlrpc.php /a1b2c3d4e5f6g7h8i9/nonexistentfile.php /ads/adxmlrpc.php /adserver/adxmlrpc.php /adxmlrpc.php /b2/xmlsrv/xmlrpc.php /b2evo/xmlsrv/xmlrpc.php /blog/xmlrpc.php /blog/xmlsrv/xmlrpc.php /blogs/xmlrpc.php /blogs/xmlsrv/xmlrpc.php /blogtest/xmlsrv/xmlrpc.php /community/xmlrpc.php /drupal/xmlrpc.php /phpAdsNew/adxmlrpc.php /phpads/adxmlrpc.php /phpadsnew/adxmlrpc.php /phpgroupware/xmlrpc.php /wordpress/xmlrpc.php /xmlrpc.php /xmlrpc/xmlrpc.php /xmlsrv/xmlrpc.php
-- System Information: Debian Release: testing/unstable APT prefers proposed-updates APT policy: (500, 'proposed-updates'), (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.4.20 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages fail2ban depends on: ii iptables 1.3.3-2 Linux kernel 2.4+ iptables adminis ii python 2.3.5-5 An interactive high-level object-o fail2ban recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]