Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Compromised RH6.1 system



Yes, and if you were running Debian with http://security.debian.org/
properly configured in /etc/apt/sources.list, your vulnerable binaries
would ahve been upgraded the next time you ran the package manager.

See, especially: http://www.debian.org/security/1999/19991116

-- Mike


On Sat, 22 Apr 2000, Derek Martin wrote:

> I've posted numerous messages about this on GNHLUG, but not here on BLU,
> so I figured I'd offer a brief summary. This past Friday, my RH6.1 machine
> was compromised.  /bin/login was replaced with a version that allowed
> anyone to log in as root with no password, and telnet (which I normally
> don't allow at all) was re-enabled.
> 
> This was apparently achieved by exploiting a bug in BIND 8.2, about which
> CERT has released an advisory:
> 
>   http://www.cert.org/advisories/CA-99-14-bind.html
> * * *
> I'm going to start running an IDS and log to a different machine, and I'd
> recommend that if you have a Linux box connected to the internet that you
> do the same. But above all, go get your BIND up to date.


-
Subcription/unsubscription/info requests: send e-mail with
"subscribe", "unsubscribe", or "info" on the first line of the
message body to discuss-request at blu.org (Subject line is ignored).




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org