On Mon, May 8, 2006 10:45 am, Paul Patrick Carpio Prantilla wrote:
> Hello Kelsey,
>
> awstats has a good history of exploits against it, and it appears to be
> commonly exploited in redhat systems. Unless that's you downloading
> "ping.txt" or "ping" --which is apparently a perl exploit that most
> likely takes an IP addresss and port for it's two arguments-- those logs
> (or at least, set of commands) look like exploit attempts.

from what i understand, this doesn't look like a log only but actual
processes running on his system. and yes there are many vulnerabilities in
awstats.

_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to