Description of Problem: Dear Sirs/Madams, Over the weekend, my RedHat Linux 7.1 server was broken into by a hacker who created a directory called /home/china and the following files and sub directory within it. He or she has changed my root password and I am unable to do any administration at this time. /etc/services file has been altered to allow entry from all ports. This happened shortly (three weeks) after opening my telnet port. This also happened once before on my 6.2 version. Is there a bug that we are unaware of? I was fine when I had telnet and ftp ports closed while using ssh2. /home/china::> ls -l total 844 -rw-r--r-- 1 root users 6372 May 9 1995 cgitelnet.tar.gz drwxr-xr-x 2 root users 4096 Jul 1 1995 dev -rwxr-xr-x 1 root users 22460 Aug 22 2000 du -rwxr-xr-x 1 root users 57452 Aug 22 2000 find -rwxr-xr-x 1 root users 19 Apr 15 2001 hack -rwxr-xr-x 1 root users 32728 Aug 22 2000 ifconfig -rwxr-xr-x 1 root users 6408 Aug 22 2000 in.fingerd -rwx------ 1 root users 7165 Aug 6 1998 linsniffer -rwxr-xr-x 1 root users 3964 Aug 22 2000 login -rwxr-xr-x 1 root users 39484 Aug 22 2000 ls -rwxr-xr-x 1 root users 53364 Aug 22 2000 netstat -rwx------ 1 root users 2796 May 16 2001 patch -rwxr-xr-x 1 root users 4568 Sep 13 2000 pg -rwxr-xr-x 1 root users 31336 Apr 13 2001 ps -rwxr-xr-x 1 root users 13184 Aug 22 2000 pstree -rwxr-xr-x 1 root users 4060 Mar 5 1999 sense -rwx------ 1 root users 8268 Oct 16 1999 sl3 -rw-r--r-- 1 root users 100424 Aug 23 2000 ssh.tgz -rwxr-xr-x 1 root users 1382 Jul 24 2000 sz -rwxr-xr-x 1 root users 0 May 22 05:05 t0rn -rwxr-xr-x 1 root users 1345 Sep 9 1999 t0rnsb -rwxr-xr-x 1 root bin 0 Jul 1 1995 t0rn~ -rwxr-xr-x 1 root users 266140 Jul 17 2000 top -rwxr-xr-x 1 root users 124076 May 22 1995 wget -rwxr-xr-x 1 root users 7578 Aug 21 2000 zum /home/china::> cat hack ./t0rn nervos 5713 Version-Release number of selected component (if applicable): How Reproducible: Steps to Reproduce: 1. 2. 3. Actual Results: Expected Results: Additional Information:
cgitelnet.tar.gz looks like a web based telnet... How do you know that the hacker broke in due to a buggy telnet?