Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 1 Aug 2002 09:16:53 -0400 (EDT)
From:      Matt Piechota <piechota@argolis.org>
To:        Artur Lindgren <bond@comitnet.se>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Trojan located in latest openssh tar files
Message-ID:  <20020801091503.H91087-100000@cithaeron.argolis.org>
In-Reply-To: <a05111b06b96ed5c3da7c@[192.168.57.109]>

next in thread | previous in thread | raw e-mail | index | archive | help

On Thu, 1 Aug 2002, Artur Lindgren wrote:

> It runs once, upon compilation of openssh, and is named sh or the
> compiling users default shell in the processlist in the process
> listing.
> This trojan attempts to connect to 203.62.158.32:6667 (hacked machine
> which has been secured now),
> and awaits one of three characters as the command;
> D execs /bin/sh
> M respawns
> A kills the deamon
> The /bin/sh executed via the D command was controlled by the daemon
> listening on 203.62.158.32:6667, potentially meaning that
> people affected by this has given a shell, possibly root, to user unknown.

Sounds like it'd only work for the current boot of the machine?  Or does
it hide somewhere and persist after reboot?

-- 
Matt Piechota


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020801091503.H91087-100000>