Just wanted to post this notice I received from CSRT

 

1. New Linux Vandal: Slapper ============================================================

eSafe''s CSRT experts would like to bring to your attention that a new form of a malicious code may exploit a vulnerability of Apache web servers installed on Linux systems. The worm initiates a buffer overflow in the OpenSSL module on those servers and if the attack is successful, the worm inserts its own source code onto the attacked system. After the code is inserted, it is compiled and executed. The worm then opens a backdoor into the infected system which allows hackers to access data and initiate attacks from the infected machine.

 

This new threat has been inspected for a few days by us and

we are glad to inform our customers that there are several, relatively simple methods of overcoming this threat:

 

* Update the SSL module used by the Apache server. The

latest patch is invulnerable to Slapper''s attacks.

 

* Systems with no access to the ''gcc'' compiler cannot be infected by the Slapper worm. Therefore, one should not keep the C compiler on the production web servers. Alternatively, you may limit the access to the compiler to specific users.

 

* By blocking all unused ports, Slapper has no way of

accessing your system (- Slapper attempt to enter a system

by attacking port 2002). In case you are not using SSL, you should also block port 443.

 

* If Slapper is already infecting your system, you may be

able to shut it down by closing its process. The process is called ''.bugtraq''.

 

 

 

Visit our web site for great deals on Computers and Hardware and for insightful and unique reviews of the latest hardware offerings by all of the major manufacturers. www.l-and-m-associates.com

 

Reply via email to