mobile logo

A privilege escalation vulnerability exists in Exim, the mail transfer agent used by cPanel & WHM. All MNX Solutions customers have been patched, and are no longer vulnerable to this privilege escalation vulnerability. If you are not an MNX Solutions customer, you should read the following page for details on how to correct the problem: From http://mail.cpanel.net/pipermail/news_cpanel.net/2010-December/000060.html: To resolve and work around the issue, for Linux-based systems cPanel has issued new Exim RPMs. The new version of Exim locks configuration file locations to the /etc/exim prefix as well as disabling use of the -D flag. Server Owners are strongly urged to upgrade to the …

Read More

This is the third and concluding part of our short series on what to look for when hiring a PHP programmer for your company. In part #1 we took a look at ensuring the programmer was vigilant against SQL injection vulnerabilities. In part #2 we reviewed code formatting & commenting practices. For this final portion we will tackle a set of topics more directly related to your business' intellectual property interests. Programming Frameworks As a programmer develops a firm understanding of a language, they begin to tire of 're-inventing the wheel' as it were, and start to standardize common functionality such as …

Read More

In part #1 of our short series on hiring a quality PHP programmer, we spoke about SQL injection security. In today's post we are going to look at an outwardly less important but crucial aspect to any programmer: what their code looks like. Update: Part 3 is now available. Somewhere between obsessive and sloppy lies a programmer's coding style and methodologies. The real trick is to be able to spot a person who is dedicated to not just 'writing code' but building an application that will be maintainable for your company now and in the future. Code that is poorly structured and/or …

Read More

PHP is a fantastic web development language if for no other reason than its low learning-curve to create dynamic, database-driven web sites quickly. For this reason and others, there has been an obvious influx of web developers ready to hire-on to create your company's next web application or site. Just like any other employee, contractor or otherwise, you want to be sure that the work being done isn't just quickly thrown together by a novice, but that there is consideration with regard to appropriate programming practices and security being thought of during development. Update: Read Part #2 here and Part #3 …

Read More

A flaw in the popular ProFTPD FTP server potentially allows unauthenticated attackers to compromise a server. The problem is caused by a buffer overflow in the pr_netio_telnet_gets() function for evaluating TELNET IAC sequences. ProFTPD bug report: http://bugs.proftpd.org/show_bug.cgi?id=3521 All MNX Solutions Linux Server Management customers have been patched. Plesk 9.5 and 10 include this vulnerability. ALL CURRENT PLESK VERSIONS ARE VULNERABLE. Updating to ProFTPD version 1.3.3c or disabling FTP services is the only solution to this vulnerability. ProFTPD is capable of processing TELNET IAC sequences on port 21; the sequences enable or disable certain options not supported by the Telnet or FTP protocol itself. The …

Read More

What if you had to let someone go tomorrow for some unforeseen reason. Would you know all of the points that this person or company has access to? How can you be certain unless you keep track of these locations? Even if you know all the locations, do you understand the impact of modifying the users access? Was this users access tied to a critical cron job? Was this user account tied to MySQL access for performing monthly billing? What if this employee happened to own one of your domain names? Surprisingly, we see scenarios like this …

Read More

It has been mentioned in many places on the web, that a vulnerability in the 32-bit compatibility mode of the current Linux kernel (and previous versions) for 64-bit systems can be exploited to escalate privileges. The folks over at Ksplice have put together a patch that fixes this vulnerability, and a tool to check if your system has been compromised. More detail is available on the Ksplice Blog. RedHat / CentOS You can read the Redhat Bugzilla info associated with CVE-2010-3081 here: https://bugzilla.redhat.com/show_bug.cgi?id=634457. Details from the bug report The Red Hat Enterprise Linux 4 kernel is not affected by the publicly circulated exploit, but …

Read More

Plesk PHP upgrade

0 Comments

We are often asked to upgrade PHP on Plesk based systems. When working with Plesk based control panel systems, PHP is typically maintained by the operating system. This means RedHat 5 and CentOS 5 based servers will be running PHP version 5.1.6. Many applications have a requirement of PHP 5.2 or greater. A few options are available, we will discuss two solutions below.. Use the Atomic Corp PHP upgrade guide One simple solution is to utilize Atomic Corps PHP upgrade guide. We have used this solution successfully in the past. This wiki ebtry from Atomic Corp provides a complete …

Read More

When searching for information on creating an empty, or null rpm file, I was unable to locate the spec file details needed. In another post, I will describe my need for this empty rpm, but for now here is the minimal spec file needed to build an empty rpm: Place the following in a file called, php.spec Summary: Empty PHP Name: php Version: 0 Release: 0 License: Public Group: Applications/System %description Empty PHP RPM %files Now, build your new php rpm using the following command: # rpmbuild -bb php.spec Processing files: php-0-0 Checking for unpackaged file(s): /usr/lib/rpm/check-files %{buildroot} Wrote: /usr/src/redhat/RPMS/i386/php-0-0.i386.rpm And that's it, you now have an empty rpm!

Read More

Every week at MNX solutions we handle issues from server security and patch management to system recovery and performance tuning. In this blog series, we will review a number of firewall best practices that you can implement today on your server infrastructure. First things first, do you utilize a firewall on your server? If your answer is "no" or you are not sure, this should be one of your top priorities. You have two major choices for a firewall: hardware or software. A quick note on hardware vs. software firewalls Hardware firewalls can protect¬†every machine on a local network (on the inside or DMZ …

Read More
PAGE 3 OF 6