cPanel

New cxs v1.01

Changes:

  • Added new exploit scanning option M to be used with –option (enabled by default) and –voption. The M option scans a fingerprint lookup table of over 4500 known exploit scripts. If you cron jobs or have modified cxsftp.sh or cxscgi.sh that use an –options list, you might want to add M to the list to use this new feature
  • Digest::MD5 added to required perl modules
  • Added extra check in UI where alternative clamdsock is ticked but none entered in the textbox
  • Updated exploit definitions database
  • Don’t show user in quarantine UI if empty

cPanel Service Package includes cxs for free

We’re currently offering cxs for free as part of our cPanel Service Package.Our new product is proving popular amongst web hosting providers concerned about exploits being uploaded to client sites affecting not only their account, but all accounts on the server.By including cxs with our cPanel Service Package we’re bolstering what is already a great package that helps in securing and managing your cPanel server, whether it is large or small, new or old.

New MailScanner Front-End (MSFE) v4.29

Changes:

  • Moved mailwatch from:/usr/local/cpanel/whostmgr/docroot/3rdparty/mailwatchto:/usr/local/cpanel/whostmgr/docroot/cgi/mailwatch
  • Made mailwatch cPanel 11.25 Security Token aware
  • Added new option “MailScanner Update Rules” to front-end which will force an update of the MailScanner rules with end-user settings
  • “Access Mailwatch” will now launch into the _blank target rather than a specified name to allow for multiple windows

New MailScanner Script v2.76

Changes:

  • New Mailscanner v4.78.17:http://www.mailscanner.info/ChangeLog
  • Preserve during update new files:/usr/mailscanner/etc/rules/README/usr/mailscanner/etc/rules/EXAMPLES

ConfigServer eXploit Scanner (cxs) – Released!

ConfigServer eXploit Scanner (cxs) is a new tool from us that performs active scanning of files as they are uploaded to the server.

Active scanning is performed on all text files uploaded through:

  • PHP upload scripts (via a mod_security or suhosin hook)
  • Perl upload scripts (via a mod_security hook)
  • CGI upload scripts (via a mod_security hook)
  • Any other script type that utilizes the HTML form ENCTYPE multipart/form-data (via a mod_security hook)
  • Pure-ftpd

The active scanning of uploaded files can help prevent exploitation of an account by malware by deleting or moving suspicious files to quarantine before they become active. This includes recent exploits such as the Dark Mailer spamming script and the Gumblar Virus.

cxs also allows you to perform on-demand scanning of files, directories and user accounts for suspected exploits, viruses and suspicious resources (files, directories, symlinks, sockets). It has been tuned for performance and scalability.

Included with the cxs Command Line Interface (CLI) is a web-based User Interface (UI) to help:

  • Run scans
  • Schedule and Edit scans via CRON
  • Compose CLI scan commands
  • View, Delete and Restore files from Quarantine
  • View documentation
  • Set and Edit default values for scans
  • Edit commonly used cxs files

cxs is currently a cPanel only product.More information, pricing and ordering available here:http://www.configserver.com/cp/cxs.html

Beta Testers for ConfigServer eXploit Scanner (cxs) product

We are looking for volunteer Beta Testers for a new product that we have in development:ConfigServer eXploit Scanner (cxs) is a new tool from us that performs active scanning of files as they are uploaded to the server:

  • PHP/Perl/CGI upload scripts (using a mod_security hook)
  • pure-ftpd

The active scanning of uploaded files can help prevent exploitation of an account by malware by deleting or moving to quarantine suspicious files before they become active. Apart from this option (to delete files) the product is non-destructive.cxs also allows you to perform on-demand scanning of files, directories and user accounts for suspected exploits, viruses and suspicious resources (files, directories, symlinks, sockets). Note: cxs is not a rootkit scannercxs is a commercial product that will be sold and licensed on a per server basis. Unlike competing products, it will strictly be a one-time per server license purchase with updates for the life of the product, all at a reasonable price :)This is now closed – thanks to all who are participating and we hope for a release of this product soon.

New cmm v1.13

Changes:

  • Added new option “Manage Mail Hourly Limits” to modify per domain outgoing email limit

The latest version of Archive::Zip (v1.29) breaks MailScanner

If you receive the following error while attempting to start MailScanner:

Bareword “Cwd::getcwd” not allowed while “strict subs” in use at /usr/lib/perl5/site_perl/5.8.8/Archive/Zip.pm line 552. Compilation failed in require at /usr/mailscanner/lib/MailScanner/Message.pm line 48. BEGIN failed–compilation aborted at /usr/mailscanner/lib/MailScanner/Message.pm line 48. Compilation failed in require at /usr/mailscanner/bin/MailScanner line 107. BEGIN failed–compilation aborted at /usr/mailscanner/bin/MailScanner line 107.

then it’s likely Archive::Zip has upgraded to v1.29, which causes this problem.Edit (1st July 2009 08:20): The author of Archive::Zip has now released a bugfix for this issue and you can easily fix the issue with:

/scripts/perlinstaller –force Archive::Zip

Check that it installs v1.30 of the perl module, then restart MailScannerNote that if the cpan mirror you are using is stuck on v1.29 and will not update to 1.30, you will need to manually upgrade Archive::Zip:

wget http://search.cpan.org/CPAN/authors/id/A/AD/ADAMK/Archive-Zip-1.30.tar.gztar -xzf Archive-Zip-1.30.tar.gzcd Archive-Zip-1.30perl Makefile.PLmakemake install

New ClamAV v0.95.2

Changes:

This version improves handling of archives, adds support for –file-listin clamscan and clamdscan, and fixes various issues found in previousreleases.