OK, I'm pissed.  I found, by doing a random 'netstat', that
port 31337 is open on my computer.  And with a little fiddling,
I found that it's a primitive root shell.  So my question
is how the hell did that happen?  I also found that my hosts.allow
and hosts.deny were deleted.  I used to deny access to non-UT IPs.
It was wide open when I found it.  I have everything closed
except the stuff on the netstat output:

tcp        0      0 *:ssh                   *:*                     LISTEN      
tcp        0      0 *:6000                  *:*                     LISTEN      
tcp        0      0 *:smtp                  *:*                     LISTEN      
tcp        0      0 *:printer               *:*                     LISTEN      
tcp        0      0 localhost:domain        *:*                     LISTEN      
tcp        0      0 *:netbios-ssn           *:*                     LISTEN      
tcp        0      0 *:111                   *:*                     LISTEN      
tcp        0      0 *:31337                 *:*                     LISTEN     

The only weak link I can think of is samba, or maybe sendmail.
I only allow my LAN IPs and the UT 127.*.*.* IPs on Samba, and 
I'm using the sendmail that came with RH 6.0 -- I never
bothered with qmail. Does RH 6 have a big exploit that 
I somehow missed hearing about?  I'm running the 2.2.5-15 kernel
that came on the CD with a few modifications.

I also know that 31337 is used with Back Orifice, but I'm running
Linux.  Any ideas?  I'm not looking for a complete security
analysis, just some hunches.  I'm by no means a security expert.

Thanks,
Dave



---------------------------------------------------------------------------
Send administrative requests to [EMAIL PROTECTED]

Reply via email to