Re: Eggdrop arbitrary connection vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



<official reply from eggheads.org, the current eggdrop development group>

On Sun, Feb 09, 2003 at 08:44:50PM +0100, Paul Starzetz wrote:
> Hi,

Hello.

> 
> there is a serious security problem in the popular eggdrop IRCbot. The 
> hole allows a regular user with enough 'power' (at least power to add 
> new bot records) to use any linked instance of the bot on the botnet as 
> an instant 'proxy'. The following session demonstrates the problem with 
> an out-of-the-box eggdrop 1.6.10:

This is not a bug. When running a program, any program, the owner of
the process has the responsibility of making sure that they trust the
people they give access.

Not only is partyline access required, but they must also have access
to either add, or modify bots. In the past many people have used this
particular 'feature' for various things, including connecting to other
bots that may not be compatible with the eggdrop botnet protocol.

I personally have also used this to verify that services are available
that I cannot reach directly (ssh, http, ftp, etc). Others have written
scripts (in Tcl, the script language available to eggdrop) that interact
with various services, including FTP, SMTP, HTTP, and POP3.

To conclude, if you see this as a security threat, please feel free to
remove the user flags from the people that you do not trust to refrain
from abusing it. It is not necessary (nor the default behavior) for a
user to have the ability to do this (or even use the .relay command).

[snip]

> Hope this helps, thanks to Maciek Kroenke for bringing my attention to 
> this bug,

Next time you feel that you've found a 'bug' in eggdrop please refer to
the mailing lists at http://www.eggheads.org, or our bugzilla server at
http://www.eggheads.org/bugzilla
</official reply>

> /ih

-- 
Matthew S. Hallacy                            FUBAR, LART, BOFH Certified
http://www.poptix.net                           GPG public key 0x01938203

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux