Date: Mon, 6 Oct 2014 19:26:08 +0200 From: Hanno Böck <hanno@...eck.de> To: oss-security@...ts.openwall.com Subject: Re: automated phishing email Am Mon, 6 Oct 2014 13:12:39 -0400 schrieb Mason Loring Bliss <mason@...sses.org>: > A co-worker suggested that this might have been aimed at procmail. > > https://bpaste.net/show/41323f7d9b35 > > I'm curious if anyone has thoughts about what the target might have > been for this attempt. qmail is vulnerable: http://marc.info/?l=qmail&m=141183309314366&w=2 However I think this is probably not aimed at something. It's likely just "try if we find something vulnerable, we don't care what it is". Btw: at least one of the exploit scripts is still online. This is one of the issues that comes with this event: There are *many* hosts out there that have a very bad abuse handling. These things stay online far too long. -- Hanno Böck http://hboeck.de/ mail/jabber: hanno@...eck.de GPG: BBB51E42 Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.