[34257] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Bind 8.2 Remote-shell Exploit is actually trojan to attack NAI

daemon@ATHENA.MIT.EDU (John Fraizer)
Thu Feb 1 07:05:05 2001

Date: Thu, 1 Feb 2001 07:01:02 -0500 (EST)
From: John Fraizer <nanog@EnterZone.Net>
To: Charles Sprickman <spork@inch.com>
Cc: nanog <nanog@merit.edu>
In-Reply-To: <Pine.BSF.4.30.0102010131420.16165-100000@shell.inch.com>
Message-ID: <Pine.LNX.4.21.0102010656330.8972-100000@Overkill.EnterZone.Net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, 1 Feb 2001, Charles Sprickman wrote:

> 
> On Wed, 31 Jan 2001, Henry R. Linneweh wrote:
> 
> > I understand that, the issue I had with this is in the presentation
> > "Major net security holes identified", Should have read "Major net
> > security holes fixed " this would have been fair to Paul and crew.
> > is all I am saying.....
> 
> I think that with the remote-shell exploit just released on Bugtraq the
> next article will have to revert to "Major security hole found - chaos
> ensues".
> 

Well, in typical Bugtraq script-loser fashion, the remote-shell exploit
was actually a trojan to attack NAI:

\xa1\x45\x03\x96  ==  161.69.3.150 == dns1.nai.com

So, it turns out it's not too aweful bad of a day (unless you're NAI) and
at least you still have a few minutes before a _real_ remote-shell exploit
is released.

---
John Fraizer
EnterZone, Inc




home help back first fref pref prev next nref lref last post