Domenico
26/05/11, 15:27
Voor als je het nog niet gelezen had.
Dear ConfigServer eXploit Scanner Customer,
Due to exceptional circumstances we have taken the decision to email all
customers of our cxs application. We will only take this step in such
circumstances and would not normally send emails to our customers.
We have recently discovered several security vulnerabilities in the cxs
quarantine procedure and would like to encourage everybody to upgrade to
the latest version of cxs immediately. You can do this via the WHM
interface (Upgrade button will appear at the bottom of the page) or by
running the following command at the root shell:
cxs -U
More information about new cxs releases can be found here:
http://blog.configserver.com/
We would strongly recommend that you subscribe to the blog via RSS to
ensure you remain informed about any updates to cxs.
If you also have the csf firewall installed on your server, you should
also upgrade immediately to the latest version of that application which
was also found to have a security vulnerability. This can also be done
from the WHM interface or at the root shell with the following command:
csf -u
If you have received this email in error, please accept our apologies
and reply to this mailing and we will remove you from any future contact.
Regards,
Sarah Michaelson
Way to the Web Ltd
http://www.configserver.com
http://www.waytotheweb.com
Dear ConfigServer eXploit Scanner Customer,
Due to exceptional circumstances we have taken the decision to email all
customers of our cxs application. We will only take this step in such
circumstances and would not normally send emails to our customers.
We have recently discovered several security vulnerabilities in the cxs
quarantine procedure and would like to encourage everybody to upgrade to
the latest version of cxs immediately. You can do this via the WHM
interface (Upgrade button will appear at the bottom of the page) or by
running the following command at the root shell:
cxs -U
More information about new cxs releases can be found here:
http://blog.configserver.com/
We would strongly recommend that you subscribe to the blog via RSS to
ensure you remain informed about any updates to cxs.
If you also have the csf firewall installed on your server, you should
also upgrade immediately to the latest version of that application which
was also found to have a security vulnerability. This can also be done
from the WHM interface or at the root shell with the following command:
csf -u
If you have received this email in error, please accept our apologies
and reply to this mailing and we will remove you from any future contact.
Regards,
Sarah Michaelson
Way to the Web Ltd
http://www.configserver.com
http://www.waytotheweb.com