From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on sa.int.altlinux.org X-Spam-Level: X-Spam-Status: No, score=-1.5 required=5.0 tests=BAYES_00,DNS_FROM_OPENWHOIS autolearn=no version=3.2.5 Date: Tue, 30 Aug 2011 00:04:56 +0300 From: Michael Shigorin To: sysadmins@lists.altlinux.org Message-ID: <20110829210456.GB4289@osdn.org.ua> Mail-Followup-To: sysadmins@lists.altlinux.org Mime-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: 8bit User-Agent: Mutt/1.4.2.1i Subject: [Sysadmins] I: squid gopher vulnerability X-BeenThere: sysadmins@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: shigorin@gmail.com, ALT Linux sysadmins' discussion List-Id: ALT Linux sysadmins' discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 29 Aug 2011 21:05:37 -0000 Archived-At: List-Archive: Здравствуйте. Сообщается, что в gopher-модуле squid есть дырка; remote code exec при возможности стучаться в контролируемый gopher-сервер: http://www.opennet.ru/opennews/art.shtml?num=31624 -- ---- WBR, Michael Shigorin ------ Linux.Kiev http://www.linux.kiev.ua/