Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
First, see if you are running a patched version of the software. ======from ISS X-Force mail=========== Recommendations: The exploit that X-Force has analyzed appears to be an early version, and is somewhat unreliable. X-Force has been able to compromise remote servers with this current exploit in a lab environment. Newer and more effective versions may be circulating as well. The maintainers of PHP have updated the PHP CVS source code repository to fix this vulnerability. X-Force recommends that Web site administrators upgrade to the latest versions available for their PHP distributions. PHP downloads are available at: http://www.php.net/downloads.php The vulnerability associated with the exploit has been fixed in the file "php4/main/rfc1867.c". PHP4 administrators should verify that the revision of this file is 1.71.2.1 or higher. The latest PHP version 4.1.2 packages contain the patched version of "rfc1867.c". ======================================= Happy coding. --------------- Chuck Young Security Consulting Genuity E-Services -------------------- -----Original Message----- From: discuss-admin at blu.org [mailto:discuss-admin at blu.org]On Behalf Of Frank Ramsay Sent: Wednesday, February 27, 2002 6:01 PM To: mwblug at yahoogroups.com Cc: discuss at blu.org Subject: webserver stats. hey all, This is really directed toward those of you who run webservers. I'm writing some PHP to parse my access_log and generate some information on site usage and stuff. So what kind of information or features do you find really usefull or wish you had? -fjr _______________________________________________ Discuss mailing list Discuss at blu.org http://www.blu.org/mailman/listinfo/discuss
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |