North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical Re: Exodus: this is bad
Not only... But there is a lot of brainless schoolboys who are trying to use just this 'imapd' exploit and (due to the number of them) trojaned a lot of computers over the world. It's amazing but I saw few times the stack of trojans installed one over another. To be correct, there is a lot of _really used_ ways to broke the system. The best (and easiest) was 'imapd' and 'qpopper' exploits (you simple run scanner and it detects this services, then you run exploit and it reports _you are root, go on_, then you ftp 'lrk3' or 'lrkb' or 'root_toolkit' and install it. Other way is to use sniffered accounts for the user access, and they you have a lot of exploits to get root; the most popular are 'lprm' and 'X11' exploits for linux, loadmodule and ufsrestore for Solaris and SunOS. If you had not this security holes, it does not mean you was broken, but your chance to be brocen decreases from 30% (for linux with IMAPD) to 1 - 2 % (for other holes). I am not sure about BIND but I saw bind scanning and some logs looked like: ns.xxx.yyy volurentable .... ns.zz.ww not volurentable and I suspect someone have tried to use BIND's bugs too. On 18 Nov 1998, Michael Shields wrote: > Date: 18 Nov 1998 21:25:18 +0000 > From: Michael Shields <[email protected]> > To: "Steven J. Sobol" <[email protected]> > Cc: "Alex P. Rudnev" <[email protected]>, > Richard Irving <[email protected]>, > Jared Mauch <[email protected]>, > Adam Rothschild <[email protected]>, [email protected], > [email protected] > Subject: Re: Exodus: this is bad > > In article <[email protected]>, > "Steven J. Sobol" <[email protected]> wrote: > > On Tue, Nov 17, 1998 at 02:14:53PM +0300, Alex P. Rudnev wrote: > > > Folks. All (ALL) Linux-based NS servers > > > > even running bind 8.1.2? > > Yes, if, as his message continued in the part deleted, you are running > an unpatched imapd on the same machine. > -- > Shields. > Aleksei Roudnev, Network Operations Center, Relcom, Moscow (+7 095) 194-19-95 (Network Operations Center Hot Line),(+7 095) 239-10-10, N 13729 (pager) (+7 095) 196-72-12 (Support), (+7 095) 194-33-28 (Fax)
|