[FYI.  Doesn't seem to be anything to worry about yet if you're a
Gentoo user -- Raju]

This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="rG+KBTClKkGekJUE"
Message-ID: <[EMAIL PROTECTED]>
From: Kurt Lieber <[EMAIL PROTECTED]>
Sender: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] GLSA: rsync.gentoo.org rotation server compromised 
(200312-01)
Date: Tue, 2 Dec 2003 21:01:17 -0500


--rG+KBTClKkGekJUE
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

---------------------------------------------------------------------------=
----
GENTOO LINUX SECURITY ANNOUNCEMENT 200312-01
---------------------------------------------------------------------------=
----
          Summary : rsync.gentoo.org rotation server compromised=20
             Date : 2003-12-02
          Exploit : remote
              CVE : - None -
         Priority : Normal
---------------------------------------------------------------------------=
----

SUMMARY:
=3D=3D=3D=3D=3D=3D=3D=3D

On December 2nd at approximately 03:45 UTC, one of the servers that makes up
the rsync.gentoo.org rotation was compromised via a remote exploit.  At this
point, we are still performing forensic analysis.  However, the compromised
system had both an IDS and a file integrity checker installed and we have a
very detailed forensic trail of what happened once the box was breached, so=
 we
are reasonably confident that the portage tree stored on that box was
unaffected.  The attacker appears to have installed a rootkit and
modified/deleted some files to cover their tracks, but left the server
otherwise untouched. =20

The box was in a compromised state for approximately one hour before it was
discovered and shut down.  During this time, approximately 20 users
synchronized against the portage mirror stored on this box.  The method used
to gain access to the box remotely is still under investigation.  We will
release more details once we have ascertained the cause of the remote explo=
it.

This box is not an official Gentoo infrastructure box and is instead donated
by a sponsor.  The box provides other services not related to Gentoo Linux =
as
well and the sponsor has requested that we not publicly identify the box at
this time.  Because the Gentoo part of this box appears to be unaffected by
this exploit, we are currently honoring the sponsor's request.  That said, =
if
at any point, we determine that any file in the portage tree was
inappropriately modified, we will release full details about the compromised
server.

SOLUTION
=3D=3D=3D=3D=3D=3D=3D=3D
Again, based on the forensic analysis done so far, we are reasonably confid=
ent
that no files within the Portage tree on the box were affected.  However, t=
he
server has been removed from all rsync.*.gentoo.org rotations and will rema=
in
so until the forensic analysis has been completed and the box has been wiped
and rebuilt.  Thus, users preferring an extra level of security may ensure
that they have a correct and accurate portage tree by running:

emerge sync

Which will perform a sync against another server, thus ensuring that all fi=
les
are up to date.

--rG+KBTClKkGekJUE
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/zUPtJPpRNiftIEYRAsuzAJ9VhNxkc1+kPvnXxqF9AMYczPrN6QCfQivy
pBdmUugrjQd4fD8YmYMx4YI=
=2VEN
-----END PGP SIGNATURE-----

--rG+KBTClKkGekJUE--

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

------------------------------

End of this Digest
******************

-- 
Raj Mathur                [EMAIL PROTECTED]      http://kandalaya.org/
       GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
                      It is the mind that moves

_______________________________________________
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

Reply via email to