Package: security.debian.org Severity: critical Tags: security Justification: root security hole
"Enlarge your d1ck" spammers are using a security hole in debian : all zombified system I have tested are running apache 2.054/debian PHP 4.3.10.16 the payload of the trojan began about on may the 23th - I could manage and fill informations about that at that date, I'm sorry not to have done that before. see <news:[EMAIL PROTECTED]> I received the spam on may the 23th. I found somethin weird in spamvertized site DNS but I scanned some zombified machine and did not look at http headers of zombified machines - I should. See <news:[EMAIL PROTECTED]> Most probably zombified host dns-claim to be the spamvertized sites' SOA and (when admin did not clean their webspace :/)and their http redirects to probably more rotten machine that host the spammer's pages -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-2-k7 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]