exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

a-21.ciac-unix-attacks

a-21.ciac-unix-attacks
Posted Sep 23, 1999

a-21.ciac-unix-attacks

systems | unix
SHA-256 | 9bed35e59bb56efeeae93995e38392492207ffe006ace418132d404f4177df25

a-21.ciac-unix-attacks

Change Mirror Download

FOR OFFICIAL DOE USE ONLY--DO NOT DISTRIBUTE OUTSIDE OF DOE
________________________________________________________________________
THE COMPUTER INCIDENT ADVISORY CAPABILITY

CIAC

ADVISORY NOTICE
________________________________________________________________________

Additional Information on Current UNIX Internet Attacks

March 16, 1990, 1145 PST Number A-21


This bulletin follows up CIAC Information Bulletin A-19, UNIX Internet Attack
Advisory (notice A-19). Attacks on UNIX machines connecting to the Internet
persist, and are a very widespread and serious threat. This bulletin provides
additional information about detecting these attacks and procedures to follow to
decreasing the likelihood of attack. This information specifically concerns
SUN, ULTRIX, and BSD UNIX systems, but may be useful to system managers of other
UNIX platforms. Even if you think systems are your site are not being attacked,
it is important to recheck for evidences of intrusions and to adopt additional
precautionary measures.

1. Intruders are using tftp to obtain password files. If possible use
tftbootd in place of tftp.

2. The sendmail function has several problems which intruders can exploit.
CIAC has been informed that sendmail is secure in the latest version of
Ultrix and BSD (versions 3.1 and 5.61 respectively), but that older
versions as well as the recent versions of SunOS (up to version 4.0.3)
have exploitable features in sendmail. In general, it is advantageous
run the most recent version of an operating system. Patches for most
versions and flavors of UNIX are available (call your vendor or
CIAC), and should be installed on every system to close this avenue
of attack! (Refer to CIAC bulletin A-16)

3. There is also a well-known problem with finger in less recent versions
of UNIX. Attackers continue to exploit this vulnerability. Obtain and
install the patch for this bug! (Call your vendor or CIAC for the
availability of a patched version.)

4. Attackers are using ftp to steal system files, especially when a system
is running ftp with an anonymous login. Running the most recent version
of ftp and configuring ftp properly will take care of this problem.
SunOS 4.0.3 and the most recent versions of ULTRIX and BSD UNIX contain
the correct patches. However, it is important to follow the
instructions provided with the operating system to properly configure
the files available through anonymous ftp (e.g., file permissions,
ownership, group, etc.). Note especially that you should not use
your regular password file for the one ftp will use.

5. Programs such as telnet, su and login are being replaced by trojan horse
programs. We recommend that you compare files currently available on
your machines with those obtained from original distribution tapes of
the operating system.

6. Intruders have been leaving files and directories with both usual and
unusual names such as ".mail", ".. "(dot dot space space), "...", "h"
and "k." These files may be found in the home directories of
compromised accounts or in /tmp or /usr/tmp. Also assure that any
".rhost" files in user accounts are authorized and have not been
planted by the attacker.

7. Some intruders continue to remove entries from /etc/utmp, etc/wtmp and
usr/admin/lastlog to mask their presence. You may notice a corrupted or
invalid system log file, or notice that a logfile has been reduced in
size for an unexplained reason. Should you find this activity, please
call CIAC immediately.

8. Once an intruder has compromised your system, a backdoor may be
introduced through the introduction of scripts that set the user id
to root (setuid scripts). You should use the "find" command to
verify that all such scripts are authorized.

9. The intruder may attempt to leave an additional account on the system
to be used at a later time. Check your password file to assure that all
accounts are authorized and properly passworded. Look especially for
any unauthorized root accounts (where the user id is 0). If you have a
password checking program, check the passwords on your system to assure
that there are no easily guessed passwords or unpassworded accounts.
For information on how to obtain such a checker, please contact CIAC.

10. If you use terminal servers on your network (such as ANNEX terminal
servers), these may be used by the intruder to access other hosts on
your network. Follow the instructions for the terminal server to
provide any available auditing capability, and assure that access to the
server is controlled with passwords. Access to a terminal server is
equivalent to access to your network.

Final note: since a primary result of a successful attack is the theft of the
password file, all account passwords on a successfully attacked machine should
be immediately changed.

For additional information or assistance, please contact CIAC:

Tom Longstaff
(415) 423-4416 or (FTS) 543-4416
FAX: (415) 423-0913 or (415) 422-4294

CIAC's phone number is (415) 422-8193. You may also send e-mail to:

ciac@tiger.llnl.gov

This bulletin is partially based on information supplied by the Computer
Emergency Response Team Coordination Center. Neither the United States
Government nor the University of California nor any of their employees, makes
any warranty, expressed or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any information,
product, or process disclosed, or represents that its use would not infringe
privately owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or otherwise, does
not necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or reflect those
of the United States Government nor the University of California, and shall not
be used for advertising or product endorsement purposes.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close