Security Incidents mailing list archives
Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition
From: "Eduardo Tongson" <propolice () gmail com>
Date: Tue, 29 Jan 2008 08:06:12 +0800
Even if your users do not have shell access kernel exploits can be triggered through PHP system,exec.. and many other ways. Are you able to run something like auditd(8) to monitor file access. It can incur performance degradation but you won't run it forever anyway. Ed <http://blog.eonsec.com> On Jan 29, 2008 12:59 AM, Jeff Plewes <plewes () gmail com> wrote:
Update, The problem box: - centos 5 base, updated via yum from default repository. - httpd 2.2.3-11.el5_1.centos.3 (2.2.8 backport?) - php 5.2.5 compiled from source - courier-authlib 0.60.2 compiled from source - courier-imap-4.3.0 compiled from source - exim 4.69 compiled from source - proftpd 1.3.1 compiled from source I have no control panel of any sort installed. The box was running RH9.. had the issue.. formatted and replaced with fresh install of centos 5... copied over customer vhosts.. Gets hit again within days. ports open = 20,21,22,25,80,110,143,443 + pasv port range for ftp I have many other hosts in the datacenter with various configurations but all would have had the same apache, php, ssh, ssl versions as this box before at RH9. None of them have been hit.. none of them however, contain exim, courier, or proftpd Im starting to lean towards these packages as a possible entry-point for the trojan? And no its not ARP or DNS poisoning nor router or proxy problems. -Jeff On Jan 25, 2008 1:00 PM, Cedric Blancher <blancher () cartel-securite fr> wrote:On ven, 2008-01-25 at 13:31 +0100, Ronald van der Westen wrote:I don't think ARP cache poisoning is the problem here, unless client and server are in the same subnet.Not necessarily. Sitting on one of them subnet is way sufficient. More generally, you need to be somewhere on the path between your two targets to perform a traffic redirection. As routers and firewalls can be poisoned as any other node and as they act as gateways, they are all the more interesting targets. -- http://sid.rstack.org/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EEHi! I'm your friendly neighbourhood signature virus. Copy me to your signature file and help me spread!
Current thread:
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition, (continued)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Eduardo Tongson (Jan 28)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Graeme Fowler (Jan 29)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Paul Schmehl (Jan 29)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Valdis . Kletnieks (Jan 29)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Eduardo Tongson (Jan 30)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Graeme Fowler (Jan 30)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Jason Stelzer (Jan 30)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Eduardo Tongson (Jan 31)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Jamie Riden (Jan 31)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Eduardo Tongson (Jan 31)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Eduardo Tongson (Jan 28)
- Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition Jon R. Kibler (Jan 28)