TCP scanning increase for 4899
An observant reader reports that he is seeing a very noticeable increase in TCP scanning for port 4899 and our dshield data confirms an uptick. Port 4899 is the default port for the Radmin tool, which is a windows-based computer remote-control package. According to his data, the scans are mostly originating from Spanish-speaking South American countries. We don't have confirmation that the attackers are looking for Radmin, so if you have some packet captures please upload them and we can take a look.
Handler: Kyle Haugsness
Exploit tools are publicly available for phpMyAdmin
As a follow-up to our earlier diary about phpMyAdmin scanning, there is at least 2 exploits posted in the last 20 days on public forums for exploiting the bug from March 2009 described here: www.phpmyadmin.net/home_page/security/PMASA-2009-3.php. Suggested advice is to re-verify that your phpMyAdmin is patched and also not accessible to the general Internet to prevent future exploitation of unknown bugs.
Handler: Kyle Haugsness
Adobe Shockwave Player Update
Several readers pointed out that Adobe released a security update for the Shockwave Player today which apparently can be exploited by a remote website. No exploit details made public yet. It should be pointed out that their upgrade instructions recommend uninstalling the old version, rebooting the machine, and then installing the new version.
www.adobe.com/support/security/bulletins/apsb09-08.html
Handler: Kyle Haugsness
Comments