Latest Update from SolusVM on June 16 2013
In the last few hours a security exploit has been found. This email is to inform you of a temporary fix to eliminate this exploit whilst the issue is patched and transferred to our file servers for release.
Instructions:
You will need root SSH access to your master server. You are then required to delete the following file:
/usr/local/solusvm/www/centralbackup.php
Example:
rm -f /usr/local/solusvm/www/centralbackup.php
Once the file is deleted the exploit can no longer be used. This file only exists on the master server and the slaves will not be affecte
In the last few hours a security exploit has been found. This email is to inform you of a temporary fix to eliminate this exploit whilst the issue is patched and transferred to our file servers for release.
Instructions:
You will need root SSH access to your master server. You are then required to delete the following file:
/usr/local/solusvm/www/centralbackup.php
Example:
rm -f /usr/local/solusvm/www/centralbackup.php
Once the file is deleted the exploit can no longer be used. This file only exists on the master server and the slaves will not be affecte
No comments:
Post a Comment