> The fix is to upgrade php itself to a non-vulnerable version I believe.
> 
> Google are supposed to have blocked the search that the worm was using
> to spread itself though.

Probably not something to bet the house on. Anyone could still
manually exploit the security hole as well..... I haven't seen any
change from the server yet.... like... a basic firewall....

]# nmap -sS pchdtv.com
 
Starting nmap 3.48 ( http://www.insecure.org/nmap/ ) at 2004-12-22 10:51 EST
Interesting ports on powell.slcinet.net (128.121.217.18):
(The 1635 ports scanned but not shown below are in state: closed)
PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
23/tcp   open  telnet
25/tcp   open  smtp
79/tcp   open  finger
80/tcp   open  http
106/tcp  open  pop3pw
110/tcp  open  pop-3
119/tcp  open  nntp
139/tcp  open  netbios-ssn
143/tcp  open  imap
443/tcp  open  https
513/tcp  open  login
514/tcp  open  shell
587/tcp  open  submission
990/tcp  open  ftps
992/tcp  open  telnets
993/tcp  open  imaps
995/tcp  open  pop3s
2401/tcp open  cvspserver
3306/tcp open  mysql
5190/tcp open  aol


I haven't seen an internet server this unsecure since the Helsinki
incident of 1919, and I think we all know how that turned out.


-- 
Anthony Vito
[EMAIL PROTECTED]
_______________________________________________
mythtv-users mailing list
[email protected]
http://mythtv.org/cgi-bin/mailman/listinfo/mythtv-users

Reply via email to