Last week the target was gov.pk, a source of Cryptome.org is scanning gov.cn 
this week.

From the report:

"A sends:
I wanted to make you aware of the following from gov.cn since it is a bit 
different than the others you already posted.
It appears that gov.cn has a much broader IP space than the IR and PK research 
I saw on your site, so a buddy of mine asked that I send this in to you to have 
your community review as a comparison to your past posts.
A congrats must go out, too... they have a setup well compared to the others.  Must 
be some uniformity there."

Sample here:

--clip--
www.ahfeixi.gov.cn      61.129.45.92
        SERVER IP: 61.129.45.92
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Unix) PHP/4.3.5

SERVER IP: 61.129.45.92
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The 
remote host is running a version of PHP which is older than 5.0.3 or 4.3.10.
The remote version of this software is vulnerable to various security issues 
which may, under certain circumstances, allow attackers to execute arbitrary 
code on the remote host, provided that they can pass arbitrary data to some 
functions or bypass safe_mode. CVSS Base Score :
6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, 
CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045
....
--clip--

Link:
http://cryptome.org/gov-cn.htm

Juha-Matti
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to