On Mon, Apr 18, 2011 at 02:05:27PM -0400, Jim Salter wrote: > Package: webalizer > Followup-For: Bug #622897 > > > Moritz, I believe that the initial attack was through webalizer because > the path /var/www/.webalizer contained php injections which gave the > attackers their initial shell, which was first used to host a phishing > form which was also under /var/www/webalizer - whereas the production > site on the host was under /[redacted]/[redacted], under which no files > were added, removed, or modified. > > I'm not sure what you mean by "recent years"; but my own research showed > a widely-exploited security bug in Webalizer in 2009 which I sincerely > hope was either fixed by the upstream maintainers, or at least patched > in Debian's repos. If it's that bug... well, dear lord, please let's > get that patched, it's been two years already? =) > > Ref: > http://news.softpedia.com/news/Webalizer-Bug-Possibly-Leading-to-Mass-Web-Compromise-119983.shtml
I can't find credible information on the incident mentioned above (and most of the security websites are useless garbage anyway), however the only webalizer issues, which have been assigned a CVE ID are from 2002. (The only exception is #359745, which didn't receive a CVE ID.) We're systemically triaging 6000-7000 security issues each year and I would be surprised if an issue in a high-profile app like webalizer would have remained unnoticed either by us or other security team from Linux distributions. Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org