Vulnerability Development mailing list archives

Re: Rumours about Apache 1.3.22 exploits


From: "Richard Hamnett" <r.hamnett () btopenworld com>
Date: Wed, 6 Mar 2002 18:34:17 -0000

This is all very strange, i have a version of the exploit and i have run it
numberous times. It does not seem to affect any binaries nor does it open a
UDP backdoor port. I think the most likely explanation is what has been
mentioned previously, that it has been infected by someones machine
somewhere down the line

please DO NOT waste your time and email me for the exploit, you know the
score.

ill just give u as little info i can about the file i have

-rwxr-xr-x    1 rick     users       33189 Feb 27 17:26 73501867

73501867: ELF 32-bit LSB executable, Intel 80386, version 1, dynamically
linked (uses shared libs), not stripped

However i have set up a test rig with 'supposed' vulnerable versions of
apache and php
and i must add that the exploit did not work at all
but it didnt crash my apache like others have reported

Regards
Richard Hamnett


----- Original Message -----
From: "adamb" <adamb () twiki iconideas com>
To: <nilton.gs.sc () zipmail com br>
Cc: <vuln-dev () securityfocus com>; <venom () phreaker net>; <vugo () hotmail com>
Sent: Wednesday, March 06, 2002 5:17 PM
Subject: Re: Rumours about Apache 1.3.22 exploits


I have a copy of the virus; and I set up a test system last night.  I made
a clean install of slack 8.0 ( I have a nother slack 8 box for
comparison).

I ran the infected file, and sure enough, the same thing happened: Added
about 8 k to the files in /bin/, if you killed the process running the
port 3049 listen, it would crop up.  going to /proc/<pidnumber>., (getting
the pid from netstat -nap |grep 3049)  and
doing a cat cmdline would show the program that was spawning the port
opening.

However, the port wasn't really being listened on.  Sending packets,
trying to connect via telnet did nothing.  Evidently, according to the web
pages I've been sent to says it's supposed to grab web pages, but my
trojaned box didn't send any outgoing data (well, except for who-has
statements for it's own hostname).  Another page said it waits for special
packets with 'DOM' at a specific offset before firing.

Anyway, mine's sitting around, and I'm wondering what it's going to do.  I
don't consider the virus all that problematic, since it's not reaching out
onto my network, and it's not spreading itself beyond it's own hard disk.
I'm considering finding out what triggers this 'trojan' and writing
something to trigger it.

I've got a few logfiles -- typescripts of my activity, filesize changes,
etc, that shows that it does stuff-- and I'll make more showing it's not
listening to what I have for it...

adam


On Tue, 5 Mar 2002 nilton.gs.sc () zipmail com br wrote:

I had the same problem with a test box that I have on my network.

I think the exploit called 73501867 is a trojan. It seems to infect ELF
binaries.

When turn on the system (slackware 8.0 with kernel 2.4.5) I executed
'netstat
-an' and nothing was showed up. But, about 3 minutes later when I
executed
'netstat -an' it shows up:
Proto Recv-Q Send-Q Local Address           Foreign Address
State

udp        0      0 0.0.0.0:3049            0.0.0.0:*

Do checksum in your files.

Regards,
Nilton Gomes

-- Mensagem original --

Actally I was pasted on a so called exploit this afternoon which claims
to
exploit via post but was only pasted on a binary,
how ever please watch out for this I beleave its a working exploit but
it
also seems to open up a udp port on 3049 and some how seems to cloning
the
last proc , when stracing the 3049 all it seems to do is sit there and
recv(...) and does nothing when you type anything.

binary is called 73501867 - x86/linux mod_php v4.0.2rc1-v4.0.5 by
lorian.

Has any one seen this about before?? Is this a trojan , if not then why
does
it open udp 3049 even after a reboot.
i trace the proc opening that port kill it and it seems to clone some
how
my
last proc and then 2mins l8r opens the port again.

Any ideas?


----- Original Message -----
From: "Olaf Kirch" <okir () caldera de>
To: "H D Moore" <hdm () digitaloffense net>
Cc: <fractalg () highspeedweb net>; <vuln-dev () securityfocus com>
Sent: Wednesday, February 27, 2002 3:07 AM
Subject: Re: Rumours about Apache 1.3.22 exploits


There is a bug in the php_split_mime function in PHP 3.x and 4.x.
There
is a
working exploit floating around which provides a remote bindshell
for
PHP
versions 4.0.1 to 4.0.6 with a handful of default offsets for
different
platforms.

Blechch. This code is really icky. There's really an sprintf down
there
in the code that looks bad (apart from a few other things that look
bad).
But if I don't misread the patch, the sprintf is still there in
4.1.1.

Since the PHP developers commited another change to the affected
source file (rfc1687.c) about two days ago, speculation is that
there
is
yet
another remote exploit.

Not in the public CVS (has been removed?)

Olaf
--
Olaf Kirch         |  --- o --- Nous sommes du soleil we love when we
play
okir () monad swb de  |    / | \   sol.dhoop.naytheet.ah
kin.ir.samse.qurax
okir () caldera de    +-------------------- Why
Not?! -----------------------
         UNIX, n.: Spanish manufacturer of fire extinguishers.







------------------------------------------
Use o melhor sistema de busca da Internet
Radar UOL - http://www.radaruol.com.br






Current thread: