Exodus: this is bad
Alex P. Rudnev
alex at Relcom.EU.net
Thu Nov 19 11:40:58 UTC 1998
Not only...
But there is a lot of brainless schoolboys who are trying to use just
this 'imapd' exploit and (due to the number of them) trojaned a lot of
computers over the world. It's amazing but I saw few times the stack of
trojans installed one over another.
To be correct, there is a lot of _really used_ ways to broke the system.
The best (and easiest) was 'imapd' and 'qpopper' exploits (you simple run
scanner and it detects this services, then you run exploit and it reports
_you are root, go on_, then you ftp 'lrk3' or 'lrkb' or 'root_toolkit'
and install it.
Other way is to use sniffered accounts for the user access, and they you
have a lot of exploits to get root; the most popular are 'lprm' and 'X11'
exploits for linux, loadmodule and ufsrestore for Solaris and SunOS.
If you had not this security holes, it does not mean you was broken, but
your chance to be brocen decreases from 30% (for linux with IMAPD) to 1 -
2 % (for other holes).
I am not sure about BIND but I saw bind scanning and some logs looked
like:
ns.xxx.yyy volurentable
....
ns.zz.ww not volurentable
and I suspect someone have tried to use BIND's bugs too.
On 18 Nov 1998, Michael Shields wrote:
> Date: 18 Nov 1998 21:25:18 +0000
> From: Michael Shields <shields at msrl.com>
> To: "Steven J. Sobol" <sjsobol at nacs.net>
> Cc: "Alex P. Rudnev" <alex at Relcom.EU.net>,
> Richard Irving <rirving at onecall.net>,
> Jared Mauch <jared at puck.nether.net>,
> Adam Rothschild <asr at millburn.net>, list at inet-access.net,
> nanog at merit.edu
> Subject: Re: Exodus: this is bad
>
> In article <19981118150133.28606 at shell.nacs.net>,
> "Steven J. Sobol" <sjsobol at nacs.net> wrote:
> > On Tue, Nov 17, 1998 at 02:14:53PM +0300, Alex P. Rudnev wrote:
> > > Folks. All (ALL) Linux-based NS servers
> >
> > even running bind 8.1.2?
>
> Yes, if, as his message continued in the part deleted, you are running
> an unpatched imapd on the same machine.
> --
> Shields.
>
Aleksei Roudnev, Network Operations Center, Relcom, Moscow
(+7 095) 194-19-95 (Network Operations Center Hot Line),(+7 095) 239-10-10, N 13729 (pager)
(+7 095) 196-72-12 (Support), (+7 095) 194-33-28 (Fax)
More information about the NANOG
mailing list