/Linux)
iEYEAREDAAYFAk+qfa4ACgkQIJm2TL8VSQuJhQCcDEmoMJkMPV7agl7QQZA9D8O1
SzgAoLYM0CtNXYLTURWslRykWONBlgxv
=SrFn
-----END PGP SIGNATURE-----
--X1xGqyAVbSpAWs5A--
--===============0495376293==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce
--===============0495376293==--
From murray.crane@??? Wed May 09 14:56:50 2012
Received: from mail-ob0-f176.google.com ([209.85.214.176])
by mail.bitfolk.com with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16)
(Exim 4.72) (envelope-from <murray.crane@???>)
id 1SS8Jt-0008Uh-Tx
for users@???; Wed, 09 May 2012 14:56:50 +0000
Received: by obbef5 with SMTP id ef5so614174obb.21
for <users@???>; Wed, 09 May 2012 07:56:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
h=mime-version:in-reply-to:references:date:message-id:subject:from:to
:content-type; bh=3M83nfzgOhLQiR2wyRjbPndJJP3d2NDZnS539CKldE0=;
b=ItUVlXnQQu8UJl9cL03WpjX5XtygovsKYNGaZ3Qo516cHIpMRiFvZI7ntJhj7Cq7P6
NfZkMJlzqiBKdXGK594rwYvdMpl7KUB4pIuEG73i2B5AscSg7KGicVt3k2K2KseDMuxr
eFA7PQ2IxxddHteGVC4lgj3DOx1KApJnG/KrmII68NqfwkeyMUxh9B5td9knjMSb4Odf
+CMCnW7iYKSKPfBi3doP1pDm8K0WTPcDGzh5yQXW+ckXYPXUDYrKWCbWV0ARK11K9RjF
QgDXK8D2F4aLU2RVqlLSaPKOuoZRSiYtpYXBaWSYr28iDzC3pfsQxqsrtofEEp9hQBAh
bjlQ==
MIME-Version: 1.0
Received: by 10.182.151.113 with SMTP id up17mr463895obb.40.1336575402560;
Wed, 09 May 2012 07:56:42 -0700 (PDT)
Received: by 10.60.9.102 with HTTP; Wed, 9 May 2012 07:56:42 -0700 (PDT)
In-Reply-To: <20120509142238.GR12360@???>
References: <20120509142238.GR12360@???>
Date: Wed, 9 May 2012 15:56:42 +0100
Message-ID: <CAAiW_Gms7vhofCWzrq0-1tty=xu6r9S58Hx6YWUVTkKDB1CqWQ@???>
From: Murray Crane <murray.crane@???>
To: users@???
Content-Type: multipart/alternative; boundary=f46d0444ede115ce5a04bf9bb6c6
X-Virus-Scanner: Scanned by ClamAV on mail.bitfolk.com at Wed,
09 May 2012 14:56:50 +0000
X-SA-Exim-Connect-IP: 209.85.214.176
X-SA-Exim-Mail-From: murray.crane@???
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
spamd2.lon.bitfolk.com
X-Spam-Level:
X-Spam-ASN: AS15169 209.85.128.0/17
X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
DKIM_VALID_AU,HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS shortcircuit=no
autolearn=disabled version=3.3.1
X-Spam-Report: * -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at
http://www.dnswl.org/, low * trust
* [209.85.214.176 listed in list.dnswl.org]
* -0.0 SPF_PASS SPF: sender matches SPF record
* 0.0 HTML_MESSAGE BODY: HTML included in message
* -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
author's * domain
* -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
* 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
* valid
X-SA-Exim-Version: 4.2.1 (built Mon, 22 Mar 2010 06:51:10 +0000)
X-SA-Exim-Scanned: Yes (on mail.bitfolk.com)
Subject: Re: [bitfolk] PHP-CGI exploit probes seen - please make sure your
VPS is secured against this
X-BeenThere: users@???
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Users of BitFolk hosting <users.lists.bitfolk.com>
List-Unsubscribe: <https://lists.bitfolk.com/mailman/options/users>,
<mailto:users-request@lists.bitfolk.com?subject=unsubscribe>
List-Archive: <http://lists.bitfolk.com/lurker/list/users.html>
List-Post: <mailto:users@lists.bitfolk.com>
List-Help: <mailto:users-request@lists.bitfolk.com?subject=help>
List-Subscribe: <https://lists.bitfolk.com/mailman/listinfo/users>,
<mailto:users-request@lists.bitfolk.com?subject=subscribe>
X-List-Received-Date: Wed, 09 May 2012 14:56:51 -0000
--f46d0444ede115ce5a04bf9bb6c6
Content-Type: text/plain; charset=ISO-8859-1
Help sought...
I'm running latest WP on Ubuntu LTS (10.04) using PHP5-CGI and lighttpd. I
know full well that my PHP5 will be vulnerable (v5.3.2, damn you Ubuntu;
CATCH UP FOR F**KS SAKE!!!), but I don't know how to go about securing it
in lighty (if I even need to). I do know that if I point a browser at
"index.php?-s", I get the front page of my blog back (as if I had left the
"?-s" off) and not anything that would scream "VULNERABLE!!!" at me.
Kind regards
Murray Crane
On 9 May 2012 15:22, Andy Smith <andy@???> wrote:
> Hi,
>
> As you may be aware a major securit