exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

FA-98-95.html

FA-98-95.html
Posted Sep 23, 1999

FA-98-95.html

SHA-256 | 20b52dda8d966a268fd1ebfc842e59f1d41b56a8e327b409c3daf85d12a112e0

FA-98-95.html

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<HEAD>
<TITLE>FedCIRC Advisory FA-98-95</TITLE>
</HEAD>
<BODY>
<H1><IMG SRC="http://attrition.org/images/small_fedcirc_logo.gif" WIDTH="87" HEIGHT="93" ALT="" ALIGN="MIDDLE">
FedCIRC Advisory FA-98-95</H1>
December 14, 1998<P>

<P>
To aid in the wide distribution of essential security information, FedCIRC is
forwarding the following information from CERT/CC summary CS-98.08. FedCIRC
urges you to act on this information as soon as possible.
</P>
If you have any questions, please contact FedCIRC:

Telephone: +1 888 282 0870
Email: fedcirc@fedcirc.gov

<P>
The CERT Coordination Center periodically issues the CERT Summary to draw
attention to the types of attacks currently being reported to our incident
response team, as well as to other noteworthy incident and vulnerability
information. The summary includes pointers to sources of information for
dealing with the problems.<P>
</P>
Past CERT Summaries are available from

<UL>
<A HREF="http://attrition.org/summaries/">http://www.cert.org/summaries/</A><BR>
</UL>

<P>

<HR WIDTH="100%">

<H2>Recent Activity</H2>
<P>
Since the last CERT Summary, issued in August 1998 (<A HREF="http://attrition.org/summaries/CS-98.07.html">CS-98.07</A>), we have seen
these trends in incidents reported to us.
</P>
<OL>

<LI><H3>Vulnerability in mountd</H3>
<P>
We have seen many reports of this vulnerability being exploited on NFS servers
running certain implementations of mountd, primarily Linux. On some systems,
the vulnerable NFS server is enabled by default. This vulnerability can be
exploited even if the NFS server does not export any file systems. Intruders
who are able to exploit the vulnerability can do it remotely and can gain
administrative access. We encourage you to review CERT Advisory
CA-98.12, which describes the mountd vulnerability in more detail.
The advisory is available from

<P><A HREF="http://www.cert.org/advisories/CA-98.12.mountd.html">http://www.cert.org/advisories/CA-98.12.mountd.html</A>

<P>
<LI><H3>Spread of Windows-Based Trojan Horse Programs</H3>
<P>
In recent months, we have seen the spread of Windows-based Trojan
horse programs. The most frequently reported incidents involving
Windows-based Trojan horse programs involve the tools Back Orifice and
NetBus.
<P>
We receive occasional reports of compromised machines that have one of
these tools installed; however, the majority of reports involving
these tools are from sites noticing intruders scanning their networks
for the presence of these tools. We receive daily reports indicating
that intruders are actively scanning networks to find running instances of
these tools on already compromised machines.
<P>
Look for the following symptoms to detect those scans:
<P>
NetBus - connection request (SYN) packets to TCP port 12345<BR>
Back Orifice - UDP packets to port 31337
<P>
<P>

Keep in mind that these tools can be configured to listen on different
ports. Because of this, we encourage you to investigate any unexplained
network traffic. <P>


Because these tools are Trojan horses, users must install them or be tricked
into installing them. To impede the proliferation of this class of tools, we
encourage system administrators to educate their users about safe computing
practices (e.g., only install software from trusted sources, and use virus
scanning software on any newly introduced software).<P>

For more information about Back Orifice, we encourage you to review
CERT Vulnerability Note VN-98.07.
<P>
<A HREF="http://www.cert.org/vul_notes/VN-98.07.backorifice.html">http://www.cert.org/vul_notes/VN-98.07.backorifice.html</A>
<P>

<LI><H3>Widespread Scans</H3>
<P>
We continue to receive numerous daily reports of intruders using tools
to scan networks for multiple vulnerabilities. On July 2, we published
an incident note detailing this activity. This document is available
at
<P>
<A HREF="http://www.cert.org/incident_notes/IN-98.02.html">http://www.cert.org/incident_notes/IN-98.02.html</A>
<P>
Since July 2 these tools have become a bit more sophisticated.
Variants of the "mscan" tool now probe for the most recent
vulnerabilities including
<P>
<A HREF="http://www.cert.org/advisories/CA-98.12.mountd.html">http://www.cert.org/advisories/CA-98.12.mountd.html</A>
<P>

Additionally, these tools incorporate the ability to identify a machine's
architecture and operating system.<P>

<LI><H3>Scripted Tools</H3>
<P>
Very recently, we have received a few reports indicating that
intruders are executing widespread attacks using scripted tools to
control various information-gathering and exploitation tools. The
combination of functionality used by the scripted tools enables
intruders to automate the process of identifying and exploiting known
vulnerabilities in specific host platforms. This information is
available at
<P>
<A HREF="http://www.cert.org/incident_notes/IN-98-06.html">http://www.cert.org/incident_notes/IN-98-06.html</A>
<P>

<LI><H3>Stealth Scanning Techniques</H3>
<P>
We have received a few reports indicating that intruders are using
stealth scanning techniques. Stealth scanning is used by intruders to
avoid detection. Details about stealth scanning techniques are
available at
<P>
<A HREF="http://www.cert.org/incident_notes/IN-98.04.html">http://www.cert.org/incident_notes/IN-98.04.html</A>
<P>
</UL>

<BR>
<HR WIDTH="100%"> <BR>

<H2>What's New and Updated</H2>

Since the last CERT Summary, we have developed new and updated

<UL>
<LI>Incident Notes
<LI>Vulnerability Notes
<LI>Advisories
<LI>Vendor-Initated Bulletins
<LI>System Survivability Research information
<LI>Incident Response Courses
</UL>

If you are interested in any of these, please see our What's New web page for
descriptions and links:

<P><A HREF="http://www.cert.org/nav/whatsnew.html">http://www.cert.org/nav/whatsnew.html</A>
<P>


<HR WIDTH="100%" NOSHADE>

This document is available from: <A HREF="FA-98-95.html">http://www2.fedcirc.gov/alerts/advisories/1998/FA-98-95.html</A>

<HR WIDTH="100%" NOSHADE>

<H2>FedCIRC Contact Information</H2>

<DL>
<B>Email:</B> <A HREF="mailto:fedcirc@fedcirc.gov">fedcirc@fedcirc.gov</A><BR>
<B>Phone:</B> +1 888-282-0870 (24-hour toll-free hotline)<BR>
<B>Phone:</B> +1 412-268-6321 (24-hour hotline)<BR>
<B>Fax:</B> +1 412-268-6989<BR>
<B>Postal address:</B><BR>
<DD>
FedCIRC
CERT Coordination Center<BR>
Software Engineering Institute<BR>
Carnegie Mellon University<BR>
Pittsburgh PA 15213-3890<BR>
U.S.A.<BR>
</DL>

FedCIRC personnel answer the hotline 08:00-20:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for emergencies
during other hours, on U.S. holidays, and on weekends.
<P>

<H4>Using encryption</H4>

<P>We strongly urge you to encrypt sensitive information sent by
email. Our public PGP key is available from
<A HREF="http://www2.fedcirc.gov/keys.html">http://www2.fedcirc.gov/keys.html</A>.
If you prefer to use DES, please call the FedCIRC hotline for more
information.

<H4>Getting security information</H4>

FedCIRC publications and other security information are available from
our web site <A HREF="http://www.fedcirc.gov/">http://www.fedcirc.gov/</A>.
<P>

FedCIRC (Federal Computer Incident Response Capability) is operated by
the CERT/CC for the U.S. General Services Administration. FedCIRC
provides security services to U.S. Federal civilian agencies.
<P>

Copyright 1998 Carnegie Mellon University.<BR>
Conditions for use, disclaimers, and sponsorship information can be found in
<A HREF="http://www.cert.org/legal_stuff.html">http://www.cert.org/legal_stuff.html</A>.
<P>

* CERT is registered in the U.S. Patent and Trademark Office

<HR WIDTH="100%" NOSHADE>

<B><U>NO WARRANTY</U></B><BR>
<B>Any material furnished by Carnegie Mellon University and the
Software Engineering Institute is furnished on an "as is"
basis. Carnegie Mellon University makes no warranties of any kind,
either expressed or implied as to any matter including, but not
limited to, warranty of fitness for a particular purpose or
merchantability, exclusivity or results obtained from use of the
material. Carnegie Mellon University does not make any warranty of any
kind with respect to freedom from patent, trademark, or copyright
infringement.</B>


</BODY>
</HTML>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close