[plug] OT: latest worm affecting bind

Jon Miller jlmiller at mmtnetworks.com.au
Wed Mar 28 16:26:37 WST 2001


Thought I would pass this along.

The latest buzz in the computing world is the dreaded and dangerous new 
worm called the Lion. Similar to the Ramen worm, the Lion worm scans 
the Internet looking for Linux computers with BIND vulnerabilities -- 
more than 20% of servers on the Internet. The Lion worm infects the 
vulnerable machines, steals the password file and sends it to a site in 
China, installs a few more goodies, scans the Internet looking for 
other victims, and then tries to replicate itself.  Unfortunately, this 
worm is far more dangerous than Ramen and should be taken very 
seriously.

Lion infects Linux machines running BIND versions 8.2, 8.2-P1, 8.2.1, 
8.2.2-Px, and all 8.2.3-betas through the TSIG vulnerability we all 
know and love. The Lion worm spreads via an application called "randb", 
which scans random class B networks probing TCP port 53. Once it hits a 
system, Lion checks for vulnerabilities. Once found, Lion exploits the 
system using an exploit called "name" and then installs the t0rn 
rootkit.

Here is a fairly complete list of what is affected (according the SANS 
Institute):

    * Sends the contents of /etc/passwd, /etc/shadow, and some network 
      settings to an address in the china.com domain;
    * Deletes /etc/hosts.deny, eliminating the host-based perimeter 
      protection afforded by tcp wrappers;
    * Installs backdoor root shells on ports 60008/tcp and 33567/tcp 
      (via inetd, see /etc/inetd.conf);
    * Installs a Trojan version of ssh that listens on 33568/tcp; 
    * Kills Syslogd, so the logging on the system can't be trusted;
    * Installs a Trojan version of login;
    * Looks for a hashed password in /etc/ttyhash;
    * /usr/sbin/nscd is overwritten with a Trojan version of ssh;
    * The t0rn rootkit replaces several system binaries in order to     
      stealth itself including: du, find, ifconfig, in.telnetd, 
      in.fingerd, login, ls, mjy, netstat, ps, pstree and top;
    * "Mjy", a utility for cleaning out log entries, is placed in /bin 
      and /usr/man/man1/man1/lib/.lib/;
    * in.telnetd is also placed in these directories, but its use is 
      not known at this time;
    * A setuid shell is placed in /usr/man/man1/man1/lib/.lib/.x.

Thankfully, SANS has developed a utility called Lionfind that will 
detect the infected system. This utility lists files on the system are 
suspect; however, it is not able to remove the virus at this time. 
Download Lionfind at: http://www.sans.org/y2k/lionfind-0.1.tar.gz


Jon L. Miller, MCNE ASE
Director/Sr Systems Consultant
MMT Networks Pty Ltd
http://www.mmtnetworks.com.au
PH: +61 8 9242 8600
FX: +61 8 9242 8611
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.plug.org.au/pipermail/plug/attachments/20010328/5876d00d/attachment.htm>


More information about the plug mailing list