Last April my server (at a different ISP) was compromised with a very similar AWStats exploit and the shv5 rootkit was installed. Luckily I noticed it quickly and since Apache was
not running as root (very important!) I was able to easily kill it and remove the files.
I removed AWStats since it's an unnecessary risk for the small service it provides, but if you need statistics, you can apply access control like the previous poster suggested. Try this:
Code:
<Location /cgi-bin/awstats.pl>
Order Deny,Allow
Deny From All
Allow 1.2.3.4
</Location>
to allow by IP address, or use password authentication, like this:
Code:
<Location /cgi-bin/awstats.pl>
AuthType Basic
AuthName "AWStats"
AuthUserFile /path/to/passwd_file
require valid-user
</Location>
You can use "htpasswd -c /path/to/passwd_file username" to set the password.
You dodged a bullet this time, but you should do something because AWStats will likely have more exploits in the future, and you don't want to turn your LVS into a spambot!