![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.80111 |
Categoría: | Gain a shell remotely |
Título: | UnrealIRCd Backdoor |
Resumen: | Detection of backdoor in UnrealIRCd. |
Descripción: | Summary: Detection of backdoor in UnrealIRCd. Vulnerability Insight: Remote attackers can exploit this issue to execute arbitrary system commands within the context of the affected application. Affected Software/OS: The issue affects Unreal 3.2.8.1 for Linux. Reportedly package Unreal3.2.8.1.tar.gz downloaded in November 2009 and later is affected. The MD5 sum of the affected file is 752e46f2d873c1679fa99de3f52a274d. Files with MD5 sum of 7b741e94e867c0a7370553fd01506c66 are not affected. Solution: Install latest version of unrealircd and check signatures of software you're installing. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-2075 BugTraq ID: 40820 http://www.securityfocus.com/bid/40820 http://www.exploit-db.com/exploits/13853 http://seclists.org/fulldisclosure/2010/Jun/277 http://seclists.org/fulldisclosure/2010/Jun/284 http://security.gentoo.org/glsa/glsa-201006-21.xml http://www.openwall.com/lists/oss-security/2010/06/14/11 http://osvdb.org/65445 http://secunia.com/advisories/40169 http://www.vupen.com/english/advisories/2010/1437 |
Copyright | Copyright (C) 2010 Vlatko Kosturjak |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |