There is a "rumour" that metasploit has an exploit to knock the server
running this version of VSFTP. Apparently, this particular version was
trojaned in 2011.

Not so sure about this though but if anyone has such running now and
they haven't applied any patches; please run some pen-testing to be sure
you are safe.

I may need to get my hands on a machine with that version to verify
whether its a rumour or its the real thing.

Cheers,

-- 
- Phillip.

“Aoccdrnig to rscheearch at an Elingsh uinervtisy, it deosn't mttaer in waht
oredr the ltteers in a wrod are, the olny iprmoetnt tihng is taht the frist
and lsat ltteer are in the rghit pclae.
 The rset can be a toatl mses  and
you can sitll raed it wouthit a porbelm. Tihs is bcuseae we do not raed
ervey lteter by it slef but the wrod as a wlohe and the biran fguiers it
out aynawy."

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to