----- Original Message ----- 
Sent: Sunday, June 22, 2003 1:21 PM
Subject: [cobalt-security] options sniffing via email?


> Can anyone shed some light on (how and why) someone
> may be attempting to email what appears to be options
> information to themselves? 
> 
> I received a couple of bounces (host unknown) like this:
> 
> ==========
> Return-Path: <httpd>
> Received: (from [EMAIL PROTECTED])
>  by www.victimized.com (8.10.2/8.10.2) id h5MIAg329578
>  for [EMAIL PROTECTED]; Sun, 22 Jun 2003 13:10:42 -0500
> Date: Sun, 22 Jun 2003 13:10:42 -0500
> From: httpd <httpd>
> Message-Id: <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> MIME-Version: 1.0
> 
> Options +ExecCGI
> AddHandler cgi-script .cgi
> AddHandler cgi-script .pl
> ==========
> 
> I *do* have cgi-wrap disabled on my RaQ4, so I'm a bit worried.
> I'd appreciate any feedback. Thank you all for your valuable time.
> 
> Regards,
> --
> David Black
> Houston, TX

For anyone who might be interested... this was caused 
by a WebBBS remote command execution exploit:

    http://www.securityfocus.com/bid/5048
    http://www.xatrix.org/article1638.html

--
David Black
Houston, TX
_______________________________________________
cobalt-security mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-security

Reply via email to