Hello,
I have several clients who need to be PCI Compliant, and I am their host.
I am running DA on 3 servers...these items will need to be addressed on all three servers.
Server/DA versions:
Server 1: DirectAdmin 1.29.2
Server 2: DirectAdmin 1.31.1
Server 3: DirectAdmin 1.28.5
(Would updating DA to current version (?) on all 3 servers correct any of these items?)
So here are some items and questions:
Item 1: The remote POP3 server might be vulnerable to a buffer overflow bug when it is issued at least one of these commands, with a too long argument : auth user pass If confirmed, this problem might allow an attacker to execute arbitrary code on the remote system, thus giving him an interactive session on this host. Solution: If you do not use POP3, disable this service in /etc/inetd.conf and restart the inetd process. Otherwise, upgrade to a newer version.
Question 1: How would I update to the newest (stable/secure) version of pop3?
Server 1: vm-Pop3d 1.1.7f-DA-2
Server 2: vm-Pop3d 1.1.7f-DA-2
Server 3: vm-Pop3d 1.1.7f-DA-2
Item 2: The remote host is using the Apache mod_frontpage module. mod_frontpage older than 1.6.1 is vulnerable to a buffer overflow which may allow an attacker to gain root access. *** Since SMetrics was not able to remotely determine the version *** of mod_frontage you are running,
you are advised to manually *** check which version you are running as this might be a false *** positive.
Question 2: How do I tell what version of mod_frontpage I am running, and how would I update to the newest (stable/secure) version? I do require FP for my clients to use.
Item 3: Synopsis : The remote service encrypts traffic using a protocol with known weaknesses. Description : The remote service accepts connections encrypted using SSL 2.0, which reportedly suffers from several cryptographic flaws and has been deprecated for several years. An attacker may be able to exploit these issues to conduct man-in-the-middle attacks or decrypt communications between the affected service and clients. Solution: Consult the application's documentation to disable SSL 2.0 and use SSL 3.0 or TLS 1.0 instead.
Quesiton 3: How would I update this?
Thanks for any information you can provide.
Becky
I have several clients who need to be PCI Compliant, and I am their host.
I am running DA on 3 servers...these items will need to be addressed on all three servers.
Server/DA versions:
Server 1: DirectAdmin 1.29.2
Server 2: DirectAdmin 1.31.1
Server 3: DirectAdmin 1.28.5
(Would updating DA to current version (?) on all 3 servers correct any of these items?)
So here are some items and questions:
Item 1: The remote POP3 server might be vulnerable to a buffer overflow bug when it is issued at least one of these commands, with a too long argument : auth user pass If confirmed, this problem might allow an attacker to execute arbitrary code on the remote system, thus giving him an interactive session on this host. Solution: If you do not use POP3, disable this service in /etc/inetd.conf and restart the inetd process. Otherwise, upgrade to a newer version.
Question 1: How would I update to the newest (stable/secure) version of pop3?
Server 1: vm-Pop3d 1.1.7f-DA-2
Server 2: vm-Pop3d 1.1.7f-DA-2
Server 3: vm-Pop3d 1.1.7f-DA-2
Item 2: The remote host is using the Apache mod_frontpage module. mod_frontpage older than 1.6.1 is vulnerable to a buffer overflow which may allow an attacker to gain root access. *** Since SMetrics was not able to remotely determine the version *** of mod_frontage you are running,
you are advised to manually *** check which version you are running as this might be a false *** positive.
Question 2: How do I tell what version of mod_frontpage I am running, and how would I update to the newest (stable/secure) version? I do require FP for my clients to use.
Item 3: Synopsis : The remote service encrypts traffic using a protocol with known weaknesses. Description : The remote service accepts connections encrypted using SSL 2.0, which reportedly suffers from several cryptographic flaws and has been deprecated for several years. An attacker may be able to exploit these issues to conduct man-in-the-middle attacks or decrypt communications between the affected service and clients. Solution: Consult the application's documentation to disable SSL 2.0 and use SSL 3.0 or TLS 1.0 instead.
Quesiton 3: How would I update this?
Thanks for any information you can provide.
Becky
Last edited: