exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

e-14.wuarchive-ftpd-trojan

e-14.wuarchive-ftpd-trojan
Posted Sep 23, 1999

e-14.wuarchive-ftpd-trojan

tags | trojan
SHA-256 | 16014495a6ceb92091c66d2636c161ac206d9b1f33ae53c20e9bc6ba8c28d831

e-14.wuarchive-ftpd-trojan

Change Mirror Download
             _____________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

Advisory Notice

wuarchive ftpd Trojan Horse

April 6, 1994 1640 PST Number E-14
______________________________________________________________________________
PROBLEM: Some copies of wuarchive FTP daemon (ftpd) source have been modified
and contain a Trojan horse.
PLATFORM: UNIX machines running wuarchive ftpd version 2.2 or earlier.
DAMAGE: Root access may be obtained.
SOLUTION: Disable the wuarchive ftpd, then retrieve and install wuarchive ftpd
version 2.3
ASSESSMENT OF VULNERABILITY: Intruders have used this Trojan horse to obtain
root access to computers on the Internet.
______________________________________________________________________________

Critical Information about wuarchive ftpd Trojan Horse

CIAC has received information that some copies of of the wuarchive FTP daemon
(ftpd) versions 2.2 and 2.1f have been modified at the source code level to
contain a Trojan horse. This Trojan allows any user, local or remote, to
become root on the affected UNIX system.

CIAC strongly recommends that all sites running these or older versions of the
wuarchive ftpd retrieve and install version 2.3. It is possible that versions
previous to 2.2 and 2.1f contain the Trojan as well.

If the new version cannot be installed in a timely manner, all FTP service
should be disabled, since this Trojan affects all systems that are running the
wuarchive ftpd, whether or not the system provides anonymous ftp service.

Sites can obtain version 2.3 via anonymous FTP from ftp.uu.net, in the file
/networking/ftp.wuarchive-ftpd/wu-ftpd-2.3.tar.Z. The BSD Checksum for this
file is 24416 181, the SVR4 Checksum for this file is 30488 361, and the MD5
Digital Signature is e58adc5ce0b6eae34f3f2389e9dc9197.

______________________________________________________________________________

For additional information or assistance, please contact CIAC:
Voice: 510-422-8193
FAX: 510-423-8002
STU-III: 510-423-2604
E-mail: ciac@llnl.gov

Previous CIAC Bulletins and other information are available via anonymous FTP
from irbis.llnl.gov (IP address 128.115.19.60).
______________________________________________________________________________

CIAC has two self-subscribing mailing lists for its two types of electronic
publications: 1. Advisories (highest priority, time critical information) or
Bulletins (important computer security information) and 2. Notes (computer
security articles of general interest). Our mailing lists are managed by a
public domain software package called ListProcessor, which ignores E-mail
header subject lines. To subscribe (add yourself) to one of our mailing lists,
send E-mail to: ciac-listproc@llnl.gov with the following request as the E-mail
message body, substituting CIAC-BULLETIN or CIAC-NOTES for (service) and valid
information for the other items in parentheses:

subscribe (service) (Full_Name) (Phone_number)

You will receive an acknowledgment containing address, initial PIN, and
information on how to change either of them, cancel your subscription, or get
help. Currently, to subscribe to both you must send two separate requests.

To subscribe an address which is a distribution list, first subscribe the
person responsible for your distribution list. You will receive an
acknowledgment, containing address and initial PIN. Change the address to the
distribution list by sending a second E-mail request. As the body of this
message, send the following request, substituting valid information for items
in parenthesis:

set (service) address (PIN) (distribution_list_address)
______________________________________________________________________________

CIAC wishes to acknowledge and thank the contribution of the CERT Coordination
Center for their timely advisory on this vulnerability.
______________________________________________________________________________

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations
and their constituencies can be obtained by sending E-mail to
first-request@first.org with an empty subject line and a message body
containing the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of the
United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for the
accuracy, completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately owned
rights. Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring by
the United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or reflect those
of the United States Government nor the University of California, and shall not
be used for advertising or product endorsement purposes.
______________________________________________________________________________

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close