Advertisement
Guest User

Untitled

a guest
Jun 16th, 2013
560
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.65 KB | None | 0 0
  1. PLEASE READ THIS INFORMATION CAREFULLY. THIS INFORMATION IS RELEVANT TO ALL VERSIONS OF SOLUSVM, INCLUDING BETA VERSIONS.
  2.  
  3. A security update has now been released for the Stable and Beta versions of SolusVM. We advise you to make this update as soon as possible.
  4.  
  5. To run the update you can either do it from within the SolusVM admin area or from CLI on the master server. To preform the update from CLI the commands differ depending on the version of SolusVM you are running.
  6.  
  7. ==================
  8.  
  9. Stable version:
  10.  
  11. /scripts/upcp
  12.  
  13. Beta version:
  14.  
  15. /scripts/upcp-beta
  16.  
  17. ==================
  18.  
  19. Once the update is complete you will have the patched system.
  20.  
  21. We have included the original instructions in this email that were given when the exploit was announced and before we released the patched updates. If you feel the need to remove the originally exploited file after the update you can do the following:
  22.  
  23. ==================
  24.  
  25. Instructions:
  26.  
  27. You will need root SSH access to your master server. You are then required to delete the following file:
  28.  
  29. /usr/local/solusvm/www/centralbackup.php
  30.  
  31. Example:
  32.  
  33. rm –f /usr/local/solusvm/www/centralbackup.php
  34.  
  35. ==================
  36.  
  37. Due to this exploit we are conducting a full audit of the SolusVM client area code. The audit is already underway and any updates, if needed will be released in quick succession.
  38.  
  39. A full explanation of this exploit will be released in due course. We will also be reviewing the release status of version 1.14 due to the advanced security features it already contains.
  40.  
  41. Thank you for your continued support and apologies for any inconvenience caused.
  42. Regards,
  43. Soluslabs Security Team
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement