Re: Strange getty found on FreeBSD 4.3-stable.

From: Wietse Venema (wietseat_private)
Date: Mon Aug 27 2001 - 18:31:33 PDT

  • Next message: George Milliken: "RE: File recovery utilities"

    Backdoor programs like this usually require a password; and the
    password is usually obfuscated (the days that ankle biters used
    the SCCS version string are long gone).
    
    If you are confident that the program is safe you can run it inside
    a shared library sandbox.
    
    For example, when a program uses strcmp() to compare your input
    against the expected password, you could run it with an ersatz
    strcmp() routine that prints the expected password:
    
        % cat strcmp.c
        strcmp(const char *a1, const char *a2)
        {
                printf("strcmp \"%s\" \"%s\"\n", a1, a2);
                return(0);
        }
        % cc -shared -o strcmp.so strcmp.c
        % (setenv LD_PRELOAD `pwd`/strcmp.so; ./backdoor)
    
    The above applies to FreeBSD 4.mumble. Details may differ for other
    systems.
    
    	Wietse
    
    Renee Teunissen:
    > 
    > Hi,
    > 
    > A few days ago I checked a clients machine for problems, sinds two
    > (unknown)
    > uderid's where added. After some seaching, nmapping I found TCP port 54
    > to be
    > open and with lsof if found a small backdoor installed as
    > /usr/bin/getty.
    > 
    > So far as I can see it's just a simple backdoor, only connecting to it
    > with
    > netcat didnt give me what I tought I should get. Anyone any idears?  I
    > put the
    > "getty" on one of my boss' machines, it can be found on
    > http://sms.pts.nl/renee/getty.gz (4KB).
    > 
    > Strings gives me something that could be a userid or something like
    > this. Anyone
    > seen thisone before? And I think they got in using a faulty telnetd.
    > 
    > Cheers,
    > Renee.
    
    -----------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Wed Aug 29 2001 - 11:47:23 PDT