[4579] in linux-net channel archive

home help back first fref pref prev next nref lref last post

A SERIOUS security problem!!!!

daemon@ATHENA.MIT.EDU (Brian A. Lantz)
Mon Sep 30 03:27:26 1996

Date: 	Sun, 29 Sep 1996 16:01:20 -0400 (EDT)
From: "Brian A. Lantz" <brian@lantz.com>
To: linux-net@vger.rutgers.edu
cc: Linus Torvalds <torvalds@cs.helsinki.fi>

The is a package out there, with complete code and instructions on how to 
break into most ANY Linux machine (and they boast, most other Unix boxes).

After knowing what to look for, I found SEVERAL WWW and FTP sites with 
this info, so the problem is WIDE-SPREAD.

This uses a security hole in telnetd, which allows passing of environment 
variables into 'login'. They define 'LD_LIBRARY_PATH' to point to a user 
(or incoming ftp) directory containing a new 'libc.so.4' or a 
'libroot.so' (also supplied in the cracker's kit), which contains NO 
security checking, and logs them in as root.

The package also contains a kit for building your own 'login' executable, 
complete with trojan horse!

Check your /bin/login file, and see if it has a recent modification date. 
If so, you have probably already been broken into! Also, check your 
/etc/passwd file for any OTHER 'root' entries, like 'rewt', etc. ANY 
other entry with a user/group of 0 is PROBABLY a backup username left in 
by a cracker, in case you found their 'login' executable.

To protect your site NOW, make sure you have a statically linked 'login' 
executable! Do it NOW! Go to sunsite.unc.edu (or any other well stocked 
site), and get a copy of the poeigl-1.39.tar.gz package. On sinsite it is 
in the /pub/Linux/system/Admin/login directory. Edit the Makefile, 
and add '-static' to the LIBS line. Do a 'make' and install AT LEAST the 
'login' executable.

Do it! NOW.........

SHARE this info with EVERY Linux user with a site available on the 
Internet, as almost ALL are (at the moment) easy pickings for crackers!

Anyone with a NEED for the actual crackers kit, can contact me personally. I 
am NOT going to make it available EXCEPT on a need to have basis, for 
obvious reasons.

To prevent this in the long run, the telnetd executable should be modified, 
and possible the login executable to prevent these kinds of security 
problems.


-----------------------------------------------------------
Brian A. Lantz     http://www.lantz.com     brian@lantz.com

REAL PORTION of Microsoft Windows code:
	while (memory_available)	{
		eat_major_portion_of_memory (no_real_reason);
		if (feel_like_it)
			make_user_THINK (this_is_an_OS);
		gates_bank_balance++;
	}











home help back first fref pref prev next nref lref last post