[bitfolk] Ubuntu 11.10 (Oneiric Ocelot) available for self-i…

Top Page

Reply to this message
Author: Andy Smith
Date:  
Subject: [bitfolk] Ubuntu 11.10 (Oneiric Ocelot) available for self-install
/Linux)

iEYEAREDAAYFAk+qfa4ACgkQIJm2TL8VSQuJhQCcDEmoMJkMPV7agl7QQZA9D8O1
SzgAoLYM0CtNXYLTURWslRykWONBlgxv
=SrFn
-----END PGP SIGNATURE-----

--X1xGqyAVbSpAWs5A--


--===============0495376293==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce

--===============0495376293==--



From murray.crane@??? Wed May 09 14:56:50 2012
Received: from mail-ob0-f176.google.com ([209.85.214.176])
    by mail.bitfolk.com with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16)
    (Exim 4.72) (envelope-from <murray.crane@???>)
    id 1SS8Jt-0008Uh-Tx
    for users@???; Wed, 09 May 2012 14:56:50 +0000
Received: by obbef5 with SMTP id ef5so614174obb.21
    for <users@???>; Wed, 09 May 2012 07:56:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
    h=mime-version:in-reply-to:references:date:message-id:subject:from:to
    :content-type; bh=3M83nfzgOhLQiR2wyRjbPndJJP3d2NDZnS539CKldE0=;
    b=ItUVlXnQQu8UJl9cL03WpjX5XtygovsKYNGaZ3Qo516cHIpMRiFvZI7ntJhj7Cq7P6
    NfZkMJlzqiBKdXGK594rwYvdMpl7KUB4pIuEG73i2B5AscSg7KGicVt3k2K2KseDMuxr
    eFA7PQ2IxxddHteGVC4lgj3DOx1KApJnG/KrmII68NqfwkeyMUxh9B5td9knjMSb4Odf
    +CMCnW7iYKSKPfBi3doP1pDm8K0WTPcDGzh5yQXW+ckXYPXUDYrKWCbWV0ARK11K9RjF
    QgDXK8D2F4aLU2RVqlLSaPKOuoZRSiYtpYXBaWSYr28iDzC3pfsQxqsrtofEEp9hQBAh
    bjlQ==
MIME-Version: 1.0
Received: by 10.182.151.113 with SMTP id up17mr463895obb.40.1336575402560;
    Wed, 09 May 2012 07:56:42 -0700 (PDT)
Received: by 10.60.9.102 with HTTP; Wed, 9 May 2012 07:56:42 -0700 (PDT)
In-Reply-To: <20120509142238.GR12360@???>
References: <20120509142238.GR12360@???>
Date: Wed, 9 May 2012 15:56:42 +0100
Message-ID: <CAAiW_Gms7vhofCWzrq0-1tty=xu6r9S58Hx6YWUVTkKDB1CqWQ@???>
From: Murray Crane <murray.crane@???>
To: users@???
Content-Type: multipart/alternative; boundary=f46d0444ede115ce5a04bf9bb6c6
X-Virus-Scanner: Scanned by ClamAV on mail.bitfolk.com at Wed,
    09 May 2012 14:56:50 +0000
X-SA-Exim-Connect-IP: 209.85.214.176
X-SA-Exim-Mail-From: murray.crane@???
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
    spamd2.lon.bitfolk.com
X-Spam-Level: 
X-Spam-ASN: AS15169 209.85.128.0/17
X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
    DKIM_VALID_AU,HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS shortcircuit=no
    autolearn=disabled version=3.3.1
X-Spam-Report: * -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at
    http://www.dnswl.org/, low *      trust
    *      [209.85.214.176 listed in list.dnswl.org]
    * -0.0 SPF_PASS SPF: sender matches SPF record
    *  0.0 HTML_MESSAGE BODY: HTML included in message
    * -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
    author's *       domain
    * -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
    *  0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
    *      valid
X-SA-Exim-Version: 4.2.1 (built Mon, 22 Mar 2010 06:51:10 +0000)
X-SA-Exim-Scanned: Yes (on mail.bitfolk.com)
Subject: Re: [bitfolk] PHP-CGI exploit probes seen - please make sure your
 VPS is secured against this
X-BeenThere: users@???
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Users of BitFolk hosting <users.lists.bitfolk.com>
List-Unsubscribe: <https://lists.bitfolk.com/mailman/options/users>,
    <mailto:users-request@lists.bitfolk.com?subject=unsubscribe>
List-Archive: <http://lists.bitfolk.com/lurker/list/users.html>
List-Post: <mailto:users@lists.bitfolk.com>
List-Help: <mailto:users-request@lists.bitfolk.com?subject=help>
List-Subscribe: <https://lists.bitfolk.com/mailman/listinfo/users>,
    <mailto:users-request@lists.bitfolk.com?subject=subscribe>
X-List-Received-Date: Wed, 09 May 2012 14:56:51 -0000


--f46d0444ede115ce5a04bf9bb6c6
Content-Type: text/plain; charset=ISO-8859-1

Help sought...

I'm running latest WP on Ubuntu LTS (10.04) using PHP5-CGI and lighttpd. I
know full well that my PHP5 will be vulnerable (v5.3.2, damn you Ubuntu;
CATCH UP FOR F**KS SAKE!!!), but I don't know how to go about securing it
in lighty (if I even need to). I do know that if I point a browser at
"index.php?-s", I get the front page of my blog back (as if I had left the
"?-s" off) and not anything that would scream "VULNERABLE!!!" at me.

Kind regards

Murray Crane



On 9 May 2012 15:22, Andy Smith <andy@???> wrote:

> Hi,
>
> As you may be aware a major securit