Re: CERT Advisory CA-2002-28 Trojan Horse Sendmail

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




I contaced Eli Klein <elijah@firstlink.com> earlier today regarding this.
It would appear he was unaware (Or says this) that his server was
used in this attack (He runs spatula.aclue.com, the server that was
used in the back door).

I was kind of amazed CERT or Sendmail or anyone for that matter hadn't tried
to contact him. It would be apparent that the interest in actually figuring
out who hacked Sendmail's ftp site, is little to none. Unless of course they
were just assuming someone was trying to frame Mr. Klein :P

Anyhow, I have made the backdoor'd sendmail code available at
http://www.enzotech.net/files/sm.backdoor.patch  and the base64
portion is decoded at http://www.enzotech.net/files/sm.backdoor.base64.txt

The service running on spatula.aclue.com on port 6667 has since been shut
down, but apparentely not by the Administrator.

It would be nice if Sendmail could provide stats on how many people were
affected, and if the maintainer of that box can provide proper forensics to
determine what activity went on.


netmask of enZo
http://www.enZotech.net

> Dave Ahmad (da@securityfocus.com) composed today:

>
>
> David Mirza Ahmad
> Symantec
> KeyID: 0x26005712
> Fingerprint: 8D 9A B1 33 82 3D B3 D0 40 EB  AB F0 1E 67 C6 1A 26 00 57 12
>







[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux