webserver stats.
Chuck Young
chy at genuity.com
Wed Feb 27 18:26:16 EST 2002
First, see if you are running a patched version of the software.
======from ISS X-Force mail===========
Recommendations:
The exploit that X-Force has analyzed appears to be an early version,
and is somewhat unreliable. X-Force has been able to compromise remote
servers with this current exploit in a lab environment. Newer and more
effective versions may be circulating as well.
The maintainers of PHP have updated the PHP CVS source code repository
to fix this vulnerability. X-Force recommends that Web site
administrators upgrade to the latest versions available for their PHP
distributions. PHP downloads are available at:
http://www.php.net/downloads.php
The vulnerability associated with the exploit has been fixed in the file
"php4/main/rfc1867.c". PHP4 administrators should verify that the
revision of this file is 1.71.2.1 or higher. The latest PHP version
4.1.2 packages contain the patched version of "rfc1867.c".
=======================================
Happy coding.
---------------
Chuck Young
Security Consulting
Genuity E-Services
--------------------
-----Original Message-----
From: discuss-admin at blu.org [mailto:discuss-admin at blu.org]On Behalf Of
Frank Ramsay
Sent: Wednesday, February 27, 2002 6:01 PM
To: mwblug at yahoogroups.com
Cc: discuss at blu.org
Subject: webserver stats.
hey all,
This is really directed toward those of you who run webservers.
I'm writing some PHP to parse my access_log and generate some information
on site usage and stuff.
So what kind of information or features do you find really usefull or
wish you had?
-fjr
_______________________________________________
Discuss mailing list
Discuss at blu.org
http://www.blu.org/mailman/listinfo/discuss
More information about the Discuss
mailing list