> -----Original Message-----
> From: Pablo Manalastas [mailto:[EMAIL PROTECTED]]
> Sent: Monday, July 02, 2001 9:30 AM
> To: [EMAIL PROTECTED]
> Subject: [plug] GMA-7 website hacked!
> 
> 
> 
> The Phil. Daily Inquirer reported today (InfoTech section)
> that the GMA-7 website was defaced by a hacker last Wednesday.
> The news article also reports that the website is hosted by
> inter.net (Contreras/Paras/etc.).  A check of the website
> http://www.gmanetwork.com/ showed that the site is running
> Apache 1.3.6/modperl 1.21/modssl 2.2.8/openssl 0.9.2b on Linux.
> Testing ssl on port 443 produced an error (bad SSL server
> certificate?).  Could this error be the cause of the security
> hole?  Anyone knows the details? Could modperl be the culprit?
> (magagalit si Orly dito).

Prolly not. It could be .cgi vulnerability.

So sites running apache/cgi, better check your CGIs. One tool I always use
is RFP's cgi scanner. It's
equipped with IDS-evasive-mode. I'm impressed with the result.

Btw, I am not saying that modperl 1.21/modssl 2.2.8/openssl 0.9.2b isn't
vulnerable.
Hopefully today or tom, I will receive new mails about linux security
issues.

-neil
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to