RE: [users@httpd] Machine compromised via apache 2.0.54... I think.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

We discovered this problem on our own server quite some time ago. It was
linked to a problem with the forum software, phpBB. If you or anyone on the
server (customers etc) are running it, they should be advised to upgrade to
the latest versions. This also goes for any *Nuke software such as postnuke
and other content management systems. Their spaghetti coded and often have a
lot of security problems. Our servers are now forbidding clients to install
any nuke CMSes as well as install phpBB because we feel its simply not worth
the risk of our entire customer base. 

Someone here probably has more technical documentation about the specific
phpBB/webalizer bug I'm referring to. 

Thanks,
Bill


-----Original Message-----
From: System Administrator [mailto:hackersreallysuck@xxxxxxxxx] 
Sent: Tuesday, September 27, 2005 10:47 AM
To: users@xxxxxxxxxxxxxxxx
Subject: [users@httpd] Machine compromised via apache 2.0.54... I think.

Because of many recent attacks on my machines in the last few months,
I built a new machine using a processor with a No-Execute bit.  I put
all my sites on there with Apache 2.0.54 and patched everything to
date.  I only allow port 80, 443, ftp and ssh to reach the machine. 
There is only one user on the machine, me.  The FTP authentication is
handled by an NcFTPd internal database.  The other day, my machine was
flooding the network and nothing worked.  I checked top and there was
a perl script called leet.pl running.  I did a find and there were
several perl scripts owned by user apache in my /tmp.  They all seemed
to be connect-back scripts.

I'm no expert on security, but it seems odd to me that a remote user
could use apache to write to my /tmp directory and then execute the
script.  Any idea how this happened?  How do I prevent it in the
future?  How do I sterilize my machine?

Thanks for the help.

Farmer J

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
   "   from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx



---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
   "   from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx



[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux