![]() |
New FTP Exploit Hitting Us?
Got word yesterday of a new FTP exploit from my host.
Anyone heard of it and found a cure? |
os/software/version?
|
yeah, what's your host running? ftp exploits aren't that common, need to patch in time
|
I logged in using cute ftp the the other and Norton detected this ...
Security Rule - Default Block DeepThroat Trojan Horse Date - 2/8/2006 time - 2:31 AM path - program files/globalscape/cuteftp/cuteftp32.exe file name - Winsock FTP client Direction - Inbound local por - 2140 protocol - TCP Is this similar to what you are getting? |
Quote:
What are u talking about, wuftp has had tons of bugs. |
It's called a security vulnerability not an exploit.
An exploit is a technique or program that takes advantage of the security vulnerability. Or maybe you're correct, your host waited until the exploit became public before they decided to upgrade, no surprise from the vast majority of hosts that spam this forum. |
there are alway exploaits
|
Hold on, I'm still collecting info from him. Hopefully the problem will be resolved soon. I'm not a server tech so it's all Ferengi to me.
|
|
Quote:
Can you be more specific? |
All times are GMT -7. The time now is 09:46 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123