Bug 24545
| Summary: | Default Install Hacked | ||
|---|---|---|---|
| Product: | [Retired] Red Hat Linux | Reporter: | David Willis <willdj> |
| Component: | inetd | Assignee: | Jeff Johnson <jbj> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | high | ||
| Version: | 6.2 | CC: | jarno.huuskonen |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | i386 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2001-01-23 11:55:21 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
David Willis
2001-01-22 13:56:55 UTC
Have traced the hacker to using IP 64.209.152.146 which may be a masquerade. As a follow up this user has been trying to login using the in.rlogind module. Fortunately I have removed all the references to this proxy host. Further more I have had multiple attempts to the ftp login from 217.80.165.206 There are no known security holes in in inetd, and it has been audited. However, other programs have had problems since the release of Red Hat Linux 6.2 and I believe one of these have been used. Be sure to apply all errata listed on http://www.redhat.com/errata/ - for maximum security, install up2date and run that on a frequent basis as well as subscribe to the redhat-watch list. |