[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[cobalt-users] RAQ4R Openwebmail exploit, am I detecting correctly?
- Subject: [cobalt-users] RAQ4R Openwebmail exploit, am I detecting correctly?
- From: "Todd Kirk" <tkirk@xxxxxxxxxxxxxx>
- Date: Tue Jan 14 21:01:01 2003
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
After reading -
I used the detection command listed at securityfocus, but only had the
below path instead of a URL directory. What does the response I received
back mean? Am I vulnerable?
[root /]# lynx -dump
/home/openwebmail/cgi-bin/openwebmail/openwebmail.pl | gre
p -i "version"
01.01.symtab.strtab.shstrtab.interp.note.ABI-tag.hash.dynsym.dynstr.gnu.
version
.gnu.version_r.rel.dyn.rel.plt.init.plt.text.fini.rodata.data.eh_frame.c
tors.dt
regards,
Todd Kirk