[13089] in bugtraq
Re: Announcement: Solaris loadable kernel module backdoor
daemon@ATHENA.MIT.EDU (Steven Alexander)
Fri Dec 24 13:14:01 1999
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <00c901bf4d7c$63c96650$0202110a@cell2000>
Date: Thu, 23 Dec 1999 13:32:02 -0600
Reply-To: Steven Alexander <steve@CELL2000.NET>
From: Steven Alexander <steve@CELL2000.NET>
X-To: Marc Esipovich <marc@MUCOM.CO.IL>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
----- Original Message -----
From: Marc Esipovich <marc@MUCOM.CO.IL>
To: <BUGTRAQ@SECURITYFOCUS.COM>
Sent: Wednesday, December 22, 1999 3:20 AM
Subject: Re: Announcement: Solaris loadable kernel module backdoor
> > With the proliferation of these types of backdoors, is there any way to
> > prevent your 'r00t3d' box from being backdoored?
Not completely. Being root means they can change almost anything. One
helpful thing is to install a progrm such as tripwire that stores checksums
of your files. However, tripwire can also be duped into believing
everything is alright(perhaps by modifying the kernel).
Another idea would be to store copies of /bin, /usr/bin, /usr/sbin,
/sbin,etc. on a cd-rom drive and backup up from those frequently, need it or
not. This will ensure that if any of these is tampered, an original will be
restored on a regular basis.
> Basically it comes down to this, can you trust your own kerenl?...
> you wake up one morning, read an article about backdoor kerenl modules,
> and quickly run off to fix your system, at that point, how can you tell
> you're not already infected by such a module? when you can't trust your
> kernel, you can't trust anything on your entire system system.
Often, you can't. UNIX users have had this problem for awhile because of
loadable kernel modules and because you can recompile the kernel.
Recently, Windows NT users have begun to face the same problem(see Phrack55)
because there are are now known ways to patch the NT kernel. See
www.phrack.com and www.cell2000.net/security/ for more information. I have
source code(C++) for a program that can add one of the described patches and
remove both of them from an sp3 kernel under NT.
-steven