[Snort-sigs] Proposed Signature - COMMUNITY WEB-PHP Remote Execution Backdoor Attempt Against Horde

Alex Kirk akirk at ...435...
Tue Feb 21 11:51:45 EST 2012


For reference, this is in our internal CVS repository as SID 21375, for
release in the next SEU.

On Fri, Feb 17, 2012 at 6:54 PM, lists at ...3397...
<lists at ...3397...>wrote:

> On 02/17/12 16:55, Alex Kirk wrote:
> > Nope, that's fresh detection. We'll get that lined up for the next SEU.
> > Thanks for the contribution - they're always welcome!
>
> Thanks Alex, more specifically this affects Horde 3.3.12 and Horde
> Groupware
> 1.2.10, I apologize for not including this in the message.  I look forward
> to
> future useful community contributions.
>
> Thanks,
> Nathan
>
>


-- 
Alex Kirk
AEGIS Program Lead
Sourcefire Vulnerability Research Team
+1-410-423-1937
alex.kirk at ...435...
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20120221/909cd5f2/attachment.html>


More information about the Snort-sigs mailing list