We've gotten e-mail from some of our readers that indicates a new variant of the Mambo/XML-RPC exploits from last year (see http://isc.sans.org/diary.php?storyid=870 and http://isc.sans.org/diary.php?storyid=823) are making the rounds. As far as we can tell, it still exploits the same vulnerabilities, so those who patched last year should be okay, but obviously there are some servers out there that haven't because we have word of a few that have been defaced via this exploit. :(
------------------------- Jim Clausing, jclausing --at-- isc.sans.org I will be teaching next: Reverse-Engineering Malware: Malware Analysis Tools and Techniques - SANS DFIR Summit & Training 2022 |
Jim 423 Posts ISC Handler Feb 19th 2006 |
Thread locked Subscribe |
Feb 19th 2006 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!