webserver stats.

Chuck Young chy at genuity.com
Wed Feb 27 18:26:16 EST 2002


First, see if you are running a patched version of the software.

======from ISS X-Force mail===========
Recommendations:

The exploit that X-Force has analyzed appears to be an early version,
and is somewhat unreliable. X-Force has been able to compromise remote
servers with this current exploit in a lab environment. Newer and more
effective versions may be circulating as well.

The maintainers of PHP have updated the PHP CVS source code repository
to fix this vulnerability. X-Force recommends that Web site
administrators upgrade to the latest versions available for their PHP
distributions. PHP downloads are available at:
http://www.php.net/downloads.php

The vulnerability associated with the exploit has been fixed in the file
"php4/main/rfc1867.c". PHP4 administrators should verify that the
revision of this file is 1.71.2.1 or higher. The latest PHP version
4.1.2 packages contain the patched version of "rfc1867.c".
=======================================

Happy coding.

---------------
Chuck Young
Security Consulting
Genuity E-Services
--------------------

-----Original Message-----
From: discuss-admin at blu.org [mailto:discuss-admin at blu.org]On Behalf Of
Frank Ramsay
Sent: Wednesday, February 27, 2002 6:01 PM
To: mwblug at yahoogroups.com
Cc: discuss at blu.org
Subject: webserver stats.


hey all,
  This is really directed toward those of you who run webservers.
  I'm writing some PHP to parse my access_log and generate some information
on site usage and stuff.
  So what kind of information or features do you find really usefull or
wish you had?

                        -fjr
_______________________________________________
Discuss mailing list
Discuss at blu.org
http://www.blu.org/mailman/listinfo/discuss




More information about the Discuss mailing list