[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[cobalt-users] RAQ4R Openwebmail exploit, am I detecting correctly?



After reading - 

I used the detection command listed at securityfocus, but only had the
below path instead of a URL directory. What does the response I received
back mean? Am I vulnerable?


[root /]# lynx -dump
/home/openwebmail/cgi-bin/openwebmail/openwebmail.pl | gre
p -i "version"

01.01.symtab.strtab.shstrtab.interp.note.ABI-tag.hash.dynsym.dynstr.gnu.
version
.gnu.version_r.rel.dyn.rel.plt.init.plt.text.fini.rodata.data.eh_frame.c
tors.dt

 
regards,
 
Todd Kirk