Security Incidents mailing list archives
RE: Systems compromised with ShellBOT perl script - part 2
From: "Poof" <poof () fansubber com>
Date: Wed, 20 Oct 2004 14:51:30 -0700
Well, just so you know... Back a BACKUP of your suexec file before upgrading httpd when you have plesk then just replace the file after upgrading with your backup. Then you'll be fine. Otherwise... You SHOULD leave qmail/etc alone when having PSA. =/ ~
-----Original Message----- From: KEM Hosting [mailto:security () kemhosting com] Sent: Wednesday, October 20, 2004 10:02 AM To: incidents () securityfocus com Subject: RE: Systems compromised with ShellBOT perl script - part 2 Yes, upgrading Apache should have been done awhile ago. The obstacle there is that I'm using Plesk (virtual host web-control panel) which installs all their custom RPMs. If you try to upgrade them with standard RPMs, bad thing tend to happen. I'm sure there's a way to upgrade, but last time I tried (qmail), things got botched badly. Anyone have experience with Plesk? Thanks for the responses. Ed ________________________________________ From: Dave [mailto:djm () mcoe k12 ca us] Sent: Wednesday, October 20, 2004 11:26 AM To: incidents () securityfocus com; security () kemhosting com Subject: Re: Systems compromised with ShellBOT perl script - part 2 I have just a couple: This is from the httpd-2.0.46-40.ent change log, you'll note that most of these can be considered exploitable hacks, and each and every one of them applies to your current install of 32.ent - mod_dav_fs: security fix for indirect lock refresh (CAN-2004-0809) - mod_dav_fs: fix indirect lock handling on 64-bit platforms - add security fixes for CAN-2004-0747, CAN-2004-0786 - mod_ssl: add security fix for CAN-2004-0751 - split security fix for CAN-2004-0748 out from -sslio patch - merge ap_rgetline_core NUL-termination fixes from 2.0.5[01] - have -devel require httpd of same V-R - drop suexec minimum acceptable gid to 100 (#127667) - mod_ssl: security fix for overflow in FakeBasicAuth (CVE CAN-2004-0488) Those are just httpd, leaving out the kernel and php hack fixes. If you dont have it set automatically, you need to have up2date download and update manually once per day. Judging by your current packages, you havent updated since March... This is not a good thing :( ----- Original Message ----- From: security () kemhosting com To: incidents () securityfocus com Sent: Tuesday, October 19, 2004 10:04 PM Subject: re: Systems compromised with ShellBOT perl script - part 2 This thread is a couple months old, but I'm having issues with this hack, found it in the archives and thought it'd be helpful if I 'resusitated' it. See bottom of email for rest of thread. Today, hackers used the ShellBOT perl script to bring down Apache and start up their IRC listener. They (somehow) copied it into /tmp and executed it. This confuses me because I have my /tmp directory mounted rw,noexec,nosuid. Does Perl somehow bypass this? While the script was running, I ran lsof and found that it had recursively accessed all my (virtual host) httpd logs (probably in an attempt to delete it's tracks = the reason I can't see how they copied the script into /tmp) which are owned by root. this is also confusing since the process the script spawned was owned by user apache. Some info on my box: Redhat ES kernel 2.4.21-9.0.1.ELsmp httpd-2.0.46-32.ent php-4.3.2-11.ent Anyone have any ideas on how this can happen? Mainly the executing of a script on a noexec mount! Obviously I'm not a guru, so it's probably something simple - so please, share! Thanks, Ed <<<<<<<<<<<<<CUT>>>>>>>>>>>>>>>
Current thread:
- DoS worm, (continued)
- DoS worm David Gillett (Oct 20)
- Re: DoS worm Nick FitzGerald (Oct 21)
- DoS worm David Gillett (Oct 20)
- Re: Systems compromised with ShellBOT perl script - part 2 Jeffrey Denton (Oct 20)
- Re: Systems compromised with ShellBOT perl script - part 2 Martin Mačok (Oct 20)
- Re: Systems compromised with ShellBOT perl script - part 2 Harry de Grote (Oct 20)
- Re: Systems compromised with ShellBOT perl script - part 2 Stephen J. Smoogen (Oct 20)
- RE: Systems compromised with ShellBOT perl script - part 2 KEM Hosting (Oct 20)
- Re: Systems compromised with ShellBOT perl script - part 2 Thomas Hochstein (Oct 21)
- Re: Systems compromised with ShellBOT perl script - part 2 Paul Schmehl (Oct 22)
- RE: Systems compromised with ShellBOT perl script - part 2 KEM Hosting (Oct 20)
- RE: Systems compromised with ShellBOT perl script - part 2 Poof (Oct 20)
- Re: Systems compromised with ShellBOT perl script - part 2 Dave (Oct 20)
- Re: Systems compromised with ShellBOT perl script - part 2 Chris Norton (Oct 22)