[plug] password sniffer - alert
Denis Brown
dsbrown at cyllene.uwa.edu.au
Fri Oct 24 12:43:49 WST 2003
Dear PLUG list members,
UWA's Grahame Bowland has permitted me to forward this.
- - - - - - -
If you are running Linux servers, please perform the following steps. Do
not skip the "cd" commands; they are vital to get around the way this
thing hides itself
1. Run: ls -la /dev/drg
If this directory exists (access it directly, do not rely on the
output of an ls of /dev/) then you may have been compromised.
2. Run: cd /sbin
Run: ls -la telinit
If this is a binary file rather than a symlink, you have almost
certainly been hacked. This advice applies to Debian GNU/Linux systems
and may not apply to other Linux variants, but please check.
The way to fix is to boot with "init=/bin/sh" and replace "/sbin/init"
with the correct "/sbin/init" which will possibly have been renamed to
"/sbin/init.drg". Upon reboot you'll be clean, and in /dev/drg/.sniffer
there will be captured passwords. You need to change analyse this file
ASAP and restrict access to accounts that have been compromised.
- - - - - -
Subsequent comments within UWA suggested that not only Debian is
vulnerable; several RH installations were mentioned. Seems a possible
attack vector was unpatched SSLs.
HTH and thanks to Grahame,
Denis
_______________________________________________
plug mailing list
plug at plug.linux.org.au
http://mail.plug.linux.org.au/cgi-bin/mailman/listinfo/plug
More information about the plug
mailing list