[Gllug] [Fwd: SSH Security Advisory: Centos (and other distros)]
Karanbir Singh
mail-lists at karan.org
Wed Jul 8 10:10:23 UTC 2009
On 07/08/2009 08:32 AM, Andy Millar wrote:
> There are no real details (and no timings) relating to any of the
> claims. For all we know, the "0pen0wn" script could just brute force
> sshd and the owner of the exemplar system just having poor passwords?
Over the last couple of days, some very capable people have been looking
at what is being claimed and how it might be possible to achieve the
results that those scripts claim to have achieved.
There are a few things to keep in mind here - cPanel has been installed
on every 'supposedly hacked' machine. an old version of grsecurity has
been installed in every 'supposedly hacked' machine and there are signs
that a non distro mysql was listening on :3306 with no firewall to wrap
around it.[1] - so there is a very high probability that the 'exploit'
is weak passwords and/or password compromise. We will all know for sure
in a few days. In the mean time, firewall off remote access to the
machine to only those destinations that need it. This is something that
most people should do anyway!
This isnt the official centos position on the issue, just what the
present thinking is. Unless there is a real exploit, there isnt much to
fix anyway.
- KB
[1]- keep in mind that there is *no* known exploit out there at the
moment, these details are only scraped together from the 'hacker logs'
and other public sources where this is being discussed.
--
Karanbir Singh : http://www.karan.org/ : 2522219 at icq
--
Gllug mailing list - Gllug at gllug.org.uk
http://lists.gllug.org.uk/mailman/listinfo/gllug
More information about the GLLUG
mailing list