Re: [bitfolk] IMPORTANT: You need to renumber the IP address…

Top Page

Reply to this message
Author: G. Miliotis
Date:  
Subject: Re: [bitfolk] IMPORTANT: You need to renumber the IP address(es) of your BitFolk VPS
y.crane@???>
To: users@???
Content-Type: multipart/alternative; boundary=f46d0444ede115ce5a04bf9bb6c6
X-Virus-Scanner: Scanned by ClamAV on mail.bitfolk.com at Wed,
    09 May 2012 14:56:50 +0000
X-SA-Exim-Connect-IP: 209.85.214.176
X-SA-Exim-Mail-From: murray.crane@???
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
    spamd2.lon.bitfolk.com
X-Spam-Level: 
X-Spam-ASN: AS15169 209.85.128.0/17
X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
    DKIM_VALID_AU,HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS shortcircuit=no
    autolearn=disabled version=3.3.1
X-Spam-Report: * -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at
    http://www.dnswl.org/, low *      trust
    *      [209.85.214.176 listed in list.dnswl.org]
    * -0.0 SPF_PASS SPF: sender matches SPF record
    *  0.0 HTML_MESSAGE BODY: HTML included in message
    * -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
    author's *       domain
    * -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
    *  0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
    *      valid
X-SA-Exim-Version: 4.2.1 (built Mon, 22 Mar 2010 06:51:10 +0000)
X-SA-Exim-Scanned: Yes (on mail.bitfolk.com)
Subject: Re: [bitfolk] PHP-CGI exploit probes seen - please make sure your
 VPS is secured against this
X-BeenThere: users@???
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: Users of BitFolk hosting <users.lists.bitfolk.com>
List-Unsubscribe: <https://lists.bitfolk.com/mailman/options/users>,
    <mailto:users-request@lists.bitfolk.com?subject=unsubscribe>
List-Archive: <http://lists.bitfolk.com/lurker/list/users.html>
List-Post: <mailto:users@lists.bitfolk.com>
List-Help: <mailto:users-request@lists.bitfolk.com?subject=help>
List-Subscribe: <https://lists.bitfolk.com/mailman/listinfo/users>,
    <mailto:users-request@lists.bitfolk.com?subject=subscribe>
X-List-Received-Date: Wed, 09 May 2012 14:56:51 -0000


--f46d0444ede115ce5a04bf9bb6c6
Content-Type: text/plain; charset=ISO-8859-1

Help sought...

I'm running latest WP on Ubuntu LTS (10.04) using PHP5-CGI and lighttpd. I
know full well that my PHP5 will be vulnerable (v5.3.2, damn you Ubuntu;
CATCH UP FOR F**KS SAKE!!!), but I don't know how to go about securing it
in lighty (if I even need to). I do know that if I point a browser at
"index.php?-s", I get the front page of my blog back (as if I had left the
"?-s" off) and not anything that would scream "VULNERABLE!!!" at me.

Kind regards

Murray Crane



On 9 May 2012 15:22, Andy Smith <andy@???> wrote:

> Hi,
>
> As you may be aware a major security problem was recently found in PHP when
> run in CGI mode. A customer has recently had their VPS compromised
> and has discovered probes for this vulnerability as described here:
>
>
> http://blog.sucuri.net/2012/05/php-cgi-vulnerability-exploited-in-the-wild.html
>
> So, if you are running PHP in CGI mode you absolutely must secure it
> against this.
>
> Cheers,
> Andy
>
> --
> http://bitfolk.com/ -- No-nonsense VPS hosting
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
>
> iEYEAREDAAYFAk+qfa4ACgkQIJm2TL8VSQuJhQCcDEmoMJkMPV7agl7QQZA9D8O1
> SzgAoLYM0CtNXYLTURWslRykWONBlgxv
> =SrFn
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> announce mailing list
> announce@???
> https://lists.bitfolk.com/mailman/listinfo/announce
>
> _______________________________________________
> users mailing list
> users@???
> https://lists.bitfolk.com/mailman/listinfo/users
>
>


--f46d0444ede115ce5a04bf9bb6c6
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Help sought...<div><br></div><div>I&#39;m running latest WP on Ubuntu LTS (=
10.04) using PHP5-CGI and lighttpd. I know full well that my PHP5 will be v=
ulnerable (v5.3.2, damn you Ubuntu; CATCH UP FOR F**KS SAKE!!!), but I don&=
#39;t know how to go about securing it in lighty (if I even need to). I do =
know that if I point a browser at &quot;index.php?-s&quot;, I get the front=
page of my blog back (as if I had left the &quot;?-s&quot; off) and not an=
ything that would scream &quot;VULNERABLE!!!&quot; at me.</div>
<div><br></div><div><div>Kind regards<br><br>Murray Crane<br><br>
<br><br><div class=3D"gmail_quote">On 9 May 2012 15:22, Andy Smith <span di=
r=3D"ltr">&lt;<a href=3D"mailto:andy@bitfolk.com" target=3D"_blank">andy@bi=
tfolk.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hi,<br>
<br>
As you may be aware a major security problem was recently found in PHP when=
<br>
run in CGI mode. A customer has recently had their VPS compromised<br>
and has discovered probes for this vulnerability as described here:<br>
<br>
=A0 =A0<a href=3D"http://blog.sucuri.net/2012/05/php-cgi-vulnerability-exp=
loited-in-the-wild.html" target=3D"_blank">http://blog.sucuri.net/2012/05/p=
hp-cgi-vulnerability-exploited-in-the-wild.html</a><br>
<br>
So, if you are running PHP in CGI mode you absolutely must secure it<br>
against this.<br>
<br>
Cheers,<br>
Andy<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br>
--<br>
<a href=3D"http://bitfolk.com/" target=3D"_blank">http://bitfolk.com/</a> -=
- No-nonsense VPS hosting<br>
</font></span><br>-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v1.4.10 (GNU/Linux)<br>
<br>
iEYEAREDAAYFAk+qfa4ACgkQIJm2TL8VSQuJhQCcDEmoMJkMPV7agl7QQZA9D8O1<br>
SzgAoLYM0CtNXYLTURWslRykWONBlgxv<br>
=3DSrFn<br>
-----END PGP SIGNATURE-----<br>
<br>_______________________________________________<br>
announce mailing list<br>
<a href=3D"mailto:announce@lists.bitfolk.com">announce@???</a=
><br>

<a href=3D"https://lists.bitfolk.com/mailman/listinfo/announce" target=3D"_=
blank">https://lists.bitfolk.com/mailman/listinfo/announce</a><br>
<br>_______________________________________________<br>
users mailing list<br>
<a href=3D"mailto:users@lists.bitfolk.com">users@???</a><br>
<a href=3D"https://lists.bitfolk.com/mailman/listinfo/users" target=3D"_bla=
nk">https://lists.bitfolk.com/mailman/listinfo/users</a><br>
<br></blockquote></div><br></div></div>

--f46d0444ede115ce5a04bf9bb6c6--


From alan@??? Wed May 09 15:36:19 2012
Received: from mail-wi0-f180.google.com ([209.85.212.180])
    by mail.bitfolk.com with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16)
    (Exim 4.72) (envelope-from <ala