|
Message-ID: <52019063.20707@gt.net> Date: Tue, 06 Aug 2013 17:10:11 -0700 From: Nathan March <nathan@...net> To: oss-security@...ts.openwall.com CC: Kurt Seifried <kseifried@...hat.com>, Assign a CVE Identifier <cve-assign@...re.org>, "Steven M. Christey" <coley@...re.org> Subject: Re: OpenX Ad Server Backdoor CVE? On 8/6/2013 4:52 PM, Kurt Seifried wrote: > According to a post by Heise Security, a backdoor has been spotted in > the popular open source ad software OpenX [1][2]. Appearantly the > backdoor has been present since at least November 2012. I tried to > download the source to verify the information, but it appears the > files have been removed. I can confirm this is in 2.8.10 that was downloaded on July 15th. It's inside the /etc/plugins/openXVideoAds.zip at ./plugins/deliveryLog/vastServeVideoPlayer/flowplayer/3.1.1/flowplayer-3.1.1.min.js md5sum on the zip matches 6b3459f16238aa717f379565650cb0cf - Nathan -- Nathan March<nathan@...net> Gossamer Threads Inc. http://www.gossamer-threads.com/ Tel: (604) 687-5804 Fax: (604) 687-5806
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.