I guess this may be a bit late - or even a bit alarmist, but ...

Someone hacked into one of my computers this morning at 8:36am
Fri the 13th (GMT +1000)
This may be a common thing - being Fri the 13th and all ...

I'm not sure if it was a person or a Worm itself, but they expoited
the fact that I have not updated apache on my Seawolf (7.1) machine

The reason for posting this widely is because I don't know how far
this has spread to or from me.
I had 3 warning signs but didn't realise until the 3rd what was going on.

The first was a VERY large tcpdump log - it was slow to process a search
I tried and I didn't realise it was the size of the file - doh!
I tcpdump ALL inbound and outbound packets

The second was http slow downs and failures that made "RUN" upstairs to
the servers and look further.

Finally, hub lights were flashing madly when I ran upstairs to check
the server so I logged in and did a full ps of the system and noticed
all these ".bugtraq" processes, so I pulled it's network cable out of
the hub and then investigated what was going on.

It put a uuencoded c program in the /tmp directory, uudecoded it,
compiled it then ran it.
The program file is called ".bugtraq.c"
The executable is ".bugtraq"
The uuencoded filename is ".uubugtraq"
Of course the files are all owned by "apache"

The IP address of the source of the program is 164.77.246.195
The network my computer was attacking when I stopped it is 189.167.x.x

The apache log was (IP=164.77.246.195):
IP - - [13/Sep/2002 08:36:06 +1000] "GET / HTTP/1.1" 400 377 "-" "-"
IP - - [13/Sep/2002 08:36:10 +1000] "GET / HTTP/1.1" 400 377 "-" "-"
IP - - [13/Sep/2002 08:40:59 +1000] "-" 408 "-" "-"

This suggests to me that it was manually set to run.

The tpcdump log show that it reports back to 164.77.246.195 something
like 40 or 50 times a minute
It all apears to be UDP packets.

I may supply the code to anyone interested, but basically comments in
the code says it is a DoS program that can handle up to a network of
16 million computers DoS'ing other computers on the net.

If you haven't updated your apache to 1.3.22-* then I suggest you do
it NOW. I haven't bothered to check which version of apache is
necessary, but my Seawolf machine had a 1.3.19-?? version on it that
has this security problem. There have been at least two Seawolf updates
1.3.22-1.7.1 and 1.3.22-5.7.1 (I've gone to -5.7.1)

My 4 other servers are all updated 7.1, 7.2 or 7.3 - I unfortunately
missed this one.
I even have the damn updates on my file server - (my own automated
script that runs every weekend to get any new updates off the mirrors)
just never typed rpm ... - oh well :-)

-- 
-Cheers
-Andrew

MS ... if only he hadn't been hang gliding!



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to