92 lines
4.2 KiB
Plaintext
92 lines
4.2 KiB
Plaintext
***********************************************************************
|
||
DDN Security Bulletin 05 DCA DDN Defense Communications System
|
||
23 Oct 89 Published by: DDN Security Coordination Center
|
||
(SCC@NIC.DDN.MIL) (800) 235-3155
|
||
|
||
DEFENSE DATA NETWORK
|
||
SECURITY BULLETIN
|
||
|
||
The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
|
||
Coordination Center) under DCA contract as a means of communicating
|
||
information on network and host security exposures, fixes, & concerns
|
||
to security & management personnel at DDN facilities. Back issues may
|
||
be obtained via FTP (or Kermit) from NIC.DDN.MIL [26.0.0.73 or
|
||
10.0.0.51] using login="anonymous" and password="guest". The bulletin
|
||
pathname is SCC:DDN-SECURITY-nn (where "nn" is the bulletin number).
|
||
|
||
**********************************************************************
|
||
|
||
ULTRIX 3.0 BREAK-IN ATTEMPTS
|
||
|
||
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
|
||
! Although there are only thirteen MILNET sites running any version of !
|
||
! Ultrix, the SCC is forwarding this CERT Advisory as an aid to those !
|
||
! Internet sites which may be affected. Note that these problems !
|
||
! have affected only sites running Ultrix 3.0. !
|
||
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
|
||
|
||
CERT Advisory
|
||
DEC/Ultrix 3.0 Systems
|
||
|
||
Recently, the CERT/CC has been working with several Unix sites that
|
||
have experienced break-ins. The bulk of the problems have stemmed from
|
||
hosts running tftpd, accounts with guessable passwords or no
|
||
passwords, and known security holes not being patched.
|
||
|
||
The intruder, once in, gains root access and replaces key programs
|
||
with ones that create log files which contain accounts and passwords in
|
||
clear text. The intruder then returns and collects the file. By using
|
||
accounts which are trusted on other systems, the intruder then installs
|
||
replacement programs which start logging.
|
||
|
||
There have been many postings about the problem from several other net
|
||
users. In addition to looking for setuid root programs in users' home
|
||
directories, hidden directories '.. ' (dot dot space space), and a modified
|
||
telnet program, we have received two reports from Ultrix 3.0 sites that
|
||
the intruders are replacing the /usr/bin/login program. The Ultrix security
|
||
hole being used in these attacks is only found in Ultrix 3.0.
|
||
|
||
Suggested steps:
|
||
1) Check for a bogus /usr/bin/login. The sum program reports:
|
||
27379 67 for VAX/Ultrix 3.0
|
||
|
||
2) Check for a bogus /usr/etc/telnetd. The sum program reports:
|
||
23552 47 for VAX/Ultrix 3.0
|
||
|
||
3) Look for .savacct in either /usr/etc or in users' directories.
|
||
This may be the file that the new login program creates. It
|
||
could have a different name on your system.
|
||
|
||
4) Upgrade to Ultrix 3.1 ASAP.
|
||
|
||
5) Monitor accounts for users having passwords that can be found in
|
||
the /usr/dict/words file or have simple passwords like a persons
|
||
name or their account name.
|
||
|
||
6) Search through the file system for programs that are setuid root.
|
||
|
||
7) Disable or modify the tftpd program so that anonymous access to
|
||
the file system is prevented.
|
||
|
||
If you find that a system that has been broken into, changing the password
|
||
on the compromised account is not sufficient. The intruders do remove copies
|
||
of the /etc/passwd file in order to break the remaining passwords. It is best
|
||
to change all of the passwords at one time. This will prevent the intruders
|
||
from using another account.
|
||
|
||
Please alert CERT if you do find a problem:
|
||
|
||
Computer Emergency Response Team
|
||
Email: cert@sei.cmu.edu
|
||
Telephone: 412-268-7090 (answers 24 hours a day)
|
||
|
||
For general questions, contact the SCC:
|
||
|
||
DDN Security Coordination Center
|
||
Email: scc@nic.ddn.mil
|
||
Telephone: 800-235-3155 (7 a.m. to 5 p.m. Pacific time)
|
||
|
||
**********************************************************************
|
||
|