Package: security.debian.org
Severity: critical
Tags: security
Justification: root security hole

"Enlarge your d1ck" spammers are using a security hole in debian :
all zombified system I have tested are running apache 2.054/debian PHP 4.3.10.16
the payload of the trojan began about on may the 23th - I could manage and fill
informations about that at that date, I'm sorry not to have done that before. 
see 
<news:[EMAIL PROTECTED]>
I received the spam on may the 23th.  I found somethin weird in spamvertized
site DNS but I scanned some zombified machine and did not look at http headers
of zombified machines - I should.
See <news:[EMAIL PROTECTED]>
Most probably zombified host dns-claim to be the spamvertized sites' SOA and
(when admin did not clean their webspace :/)and their http redirects to 
probably more rotten 
machine that host the spammer's pages

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-2-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to