public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* TRG vger.timpanogas.org hacked
@ 2001-06-05  1:36 Jeff V. Merkey
  2001-06-05  7:05 ` Alan Cox
  2001-06-05 13:07 ` Henning P. Schmiedehausen
  0 siblings, 2 replies; 11+ messages in thread
From: Jeff V. Merkey @ 2001-06-05  1:36 UTC (permalink / raw)
  To: linux-kernel; +Cc: jmerkey


Our master server (vger.timpanogas.org) running 2.2.19 was hacked and 
completely obliterated by someone using a Novell Proxy Cache via a kernel
level exploit in [sys_wait+4].  They somehow created a segmentation fault 
down inside the kernel, then gained access to the /lib directory and 
relinked the libraries to a set of bogus libs, which gave them 
access to the server.  Only public code and email is processed on 
this server.  

For those interested in reviewing this attack, I have the entire previous
hard disk available and can mount it under the public ftp area if anyone 
is curious as to how these folks did this.  They exploited BIND 8.2.3
to get in and logs indicated that someone was using a "back door" in 
Novell's NetWare proxy caches to perform the attack (since several 
different servers were used as "blinds" to get in).  

We are unable to determine just how they got in exactly, but they 
kept trying and created an oops in the affected code which allowed 
the attack to proceed.  

Jeff


^ permalink raw reply	[flat|nested] 11+ messages in thread
* RE: TRG vger.timpanogas.org hacked
@ 2001-06-05 10:33 Randal, Phil
  2001-06-05 11:07 ` Matti Aarnio
  2001-06-05 17:19 ` Brian Wellington
  0 siblings, 2 replies; 11+ messages in thread
From: Randal, Phil @ 2001-06-05 10:33 UTC (permalink / raw)
  To: linux-kernel

Bind 8.2.4 was released on May 17th, with the standard
comment "BIND 8.2.4 is the latest version of ISC BIND 8.
We strongly recommend that you upgrade to BIND 9.1 or, if
that is not immediately possible, to BIND 8.2.4 due to
certain security vulnerabilities in previous versions."

However, there are no release notes on ISC's web site,
and their vulnerabilities page lists no known security
flaws in Bind 8.2.3.

But the paranoid part of me does wonder :-)

(And I haven't the time to do the diffs to see what's
changed.)

Cheers,

Phil

---------------------------------------------
Phil Randal
Network Engineer
Herefordshire Council
Hereford, UK 

> -----Original Message-----
> From: Daniel Roesen [mailto:dr@bofh.de]
> Sent: 05 June 2001 11:14
> To: linux-kernel@vger.kernel.org
> Subject: Re: TRG vger.timpanogas.org hacked
> 
> 
> On Tue, Jun 05, 2001 at 08:05:34AM +0100, Alan Cox wrote:
> > > is curious as to how these folks did this.  They 
> exploited BIND 8.2.3
> > > to get in and logs indicated that someone was using a 
> "back door" in 
> > 
> > Bind runs as root.
> 
> Not if set up properly. And there is no known hole in BIND 8.2.3-REL
> so I'm wondering how Jeff found out that the intruder got in via BIND.
> -
> To unsubscribe from this list: send the line "unsubscribe 
> linux-kernel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/
> 

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2001-06-05 18:42 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2001-06-05  1:36 TRG vger.timpanogas.org hacked Jeff V. Merkey
2001-06-05  7:05 ` Alan Cox
2001-06-05 10:14   ` Daniel Roesen
2001-06-05 14:10   ` Michael H. Warfield
2001-06-05 18:30   ` Jeff V. Merkey
2001-06-05 18:42     ` Michael H. Warfield
2001-06-05 13:07 ` Henning P. Schmiedehausen
2001-06-05 13:41   ` Daniel Roesen
  -- strict thread matches above, loose matches on Subject: below --
2001-06-05 10:33 Randal, Phil
2001-06-05 11:07 ` Matti Aarnio
2001-06-05 17:19 ` Brian Wellington

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox