![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.80111 |
Category: | Gain a shell remotely |
Title: | UnrealIRCd Backdoor |
Summary: | Detection of backdoor in UnrealIRCd. |
Description: | Summary: Detection of backdoor in UnrealIRCd. Vulnerability Insight: Remote attackers can exploit this issue to execute arbitrary system commands within the context of the affected application. Affected Software/OS: The issue affects Unreal 3.2.8.1 for Linux. Reportedly package Unreal3.2.8.1.tar.gz downloaded in November 2009 and later is affected. The MD5 sum of the affected file is 752e46f2d873c1679fa99de3f52a274d. Files with MD5 sum of 7b741e94e867c0a7370553fd01506c66 are not affected. Solution: Install latest version of unrealircd and check signatures of software you're installing. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-2075 BugTraq ID: 40820 http://www.securityfocus.com/bid/40820 http://www.exploit-db.com/exploits/13853 http://seclists.org/fulldisclosure/2010/Jun/277 http://seclists.org/fulldisclosure/2010/Jun/284 http://security.gentoo.org/glsa/glsa-201006-21.xml http://www.openwall.com/lists/oss-security/2010/06/14/11 http://osvdb.org/65445 http://secunia.com/advisories/40169 http://www.vupen.com/english/advisories/2010/1437 |
Copyright | Copyright (C) 2010 Vlatko Kosturjak |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |