Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
|
01-18-2006, 01:05 PM
|
#16
|
Member
Registered: Jun 2004
Location: Tampa, FL
Distribution: CentOS 3.x
Posts: 33
Original Poster
Rep:
|
Yes. I was reading about the exploit in one of the sticky's here. I *think* I've patched things up... We'll see.
|
|
|
01-19-2006, 10:59 AM
|
#17
|
Senior Member
Registered: Jan 2003
Location: Devon, UK
Distribution: Debian Etc/kernel 2.6.18-4K7
Posts: 2,380
Rep:
|
You need to update the relevant php app that has the flaw. Install the security module from www.modsecurity.org (your distro probably has a package), insert and activate the module in httpd and also set the rules from modsecurity.org and this should prevent further attacks.
|
|
|
01-25-2006, 05:27 AM
|
#18
|
Member
Registered: Sep 2004
Location: London, UK
Distribution: Fedora Core 4
Posts: 59
Rep:
|
vbfischer - could you tell me where you found details of how to patch up this exploit? I'm currently suffering from the same problem.
Thanks very much
|
|
|
01-25-2006, 06:25 AM
|
#20
|
Member
Registered: Sep 2004
Location: London, UK
Distribution: Fedora Core 4
Posts: 59
Rep:
|
Thanks for that - were the files you deleted all living in /tmp ?? Or were there any others elsewhere on the filesystem?
So far I've removed files from /tmp but haven't worked out how they got there - i.e. what application was compromised to permit the exploit
|
|
|
01-25-2006, 11:48 AM
|
#21
|
Senior Member
Registered: Jan 2003
Location: Devon, UK
Distribution: Debian Etc/kernel 2.6.18-4K7
Posts: 2,380
Rep:
|
From what I have seen they operate as the user www-data or whatever your apache user is called. Have a look at your httpd.conf. To establish all the files owned by this user on the system do from a consol find -user <user_name> eg www-data.
Basically the intruder has used the fault in the application to connect a php hacking tool to give them the ability to upload software to your system. The scary part is that they probably had access to your whole file system as the apache user.
Last edited by TigerOC; 01-25-2006 at 11:51 AM.
|
|
|
01-25-2006, 12:49 PM
|
#22
|
Member
Registered: Sep 2004
Location: London, UK
Distribution: Fedora Core 4
Posts: 59
Rep:
|
Thanks for that TigerOC - I have searched for all files owned by my "apache" user and it's only turned up expected results. Hopefully I've removed all the files that the malicious user added.
However, I did see that at least one of the files created was owned by root - so presumably this means they were able to execute a root shell and that could mean a huge amount more trouble.
|
|
|
01-25-2006, 02:14 PM
|
#23
|
Senior Member
Registered: Jan 2003
Location: Devon, UK
Distribution: Debian Etc/kernel 2.6.18-4K7
Posts: 2,380
Rep:
|
You need to check whether the file owned by root was created by the intruder. If they got root access then you need to pull the server, image the drive if you want to do forensics on it, and then reformat the drive.
|
|
|
All times are GMT -5. The time now is 09:06 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|