Octothe company released a new customized Linux version (ServageOS) for use on its server clusters. When a surfer clicks the hijacked image, traffic from google is redirected to malware site. Hackers hotlink images scraped from google image search on hundreds of hacked Servage domains, then manage to take the place of the original host domain in the google image SERPs. Prior to the change Servage had been using Cisco routers.Īs of 28 April 2010, mass hacking of Servage hosted sites identified by url=. In an attempt to become fully Open Source powered Servage changed its entire network infrastructure to the Open Source routing platform GNU Zebra in 2007. Servage is operating network AS 29671 which interconnects to Versatel, TeliaSonera, Tiscali and Cogent Communications. Servage has also used the term " WebDrive" which is a registered trademark of South River Technologies Network Servage claims that the issue is resolved by their new server operating system ServageOS. There have also been large numbers of Servage customers reporting that their sites have been repeatedly hacked, resulting in malicious code being inserted into their web-pages. Servage has been criticized for overselling its services in order to keep up with competition in recent years. Company is now among the 20 largest German web hosts. ĭuring the first three years the company operated only an English version but in recent years German, Polish, Danish and Swedish versions are also offered. In 2008 Tele5 Voice Services AB changed its name to Servage AB as chairman of the Tele5 Voice Services AB board Per Bergström felt that Servage was a better suited brand name for an international corporation. The company was incorporated in 2004 by Steffan Sondermark Fallesen and later sold to the publicly listed Swedish telecommunication firm Tele5 Voice Services AB for $3.5 million cash in May 2007 and left the company in October 2009. As such, the name equates to the company's branding toward modern service. The corporate name Servage is an offspring of "Serve" and "Age". The company is a subsidiary to the Swedish company Servage AB (publ). The company is doing business as Servage Hosting. announced the version 12 of WebDrive File Access Client.Servage GmbH is a German web hosting provider headquartered in Flensburg, Germany. South River Technologies WebDrive 9.02 build 2232 installs the WebDrive Service without a security descriptor, which allows local users to (1) stop the service via the stop command, (2) execute arbitrary commands as SYSTEM by using the config command to modify the binPath variable, or (3) restart the service via the start command. It enables to access files on servers and cloud storage services as you access, store, and edit files on desktop by using the interface of a drive letter. It is currently installed on approximately 5 million desktops in over 130 countries. South River Technologies Releases WebDrive for Mac. Specializing in performance, security, and availability, the company provides vastly redundant systems, unsurpassed security, high-density deployments, and flexibility to service from ¼ cabinets to private cage environments. Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The CVE ID was allocated or reserved, and does not XF:webdrive-webdrive-privilege-escalation(53885)ĭisclaimer: The record creation date may reflect when.BUGTRAQ:20091020 South River Technologies WebDrive Service Bad Security Descriptor Local Elevation Of Privileges.on whether you should install and use WebDrive please contact the IT Service Desk at 994-1777 or. Necessarily indicate when this vulnerability wasĭiscovered, shared with the affected vendor, publicly Procedures for installing Webdrive on 64 bit Windows 10 is described. The first one, if shown, will mention South River Technologies. Buffer overflow in certain versions of South River (aka SRT) WebDrive, possibly version 6.08 build 1131 and version 8, allows remote attackers to cause a denial. This is a record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |