lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 21 Sep 2003 02:11:36 +0200
From: Robert Jaroszuk <zim@...pl>
To: Piermark <bugs84@...ero.it>
Cc: bugtraq@...urityfocus.com
Subject: Re: <Advice> Possible Backdoor into openssh-3.7.1p1-i386-1.tgz from Slackware Mirror


On Sat, 20 Sep 2003, Piermark wrote:

; Hi,
; 
; I have update my Slackware 9.0 with openssh-3.7.1p1-i386-1.tgz  from
; http://www.slackware.at/data/slackware-9.0/patches/packages/openssh-3.7.1p1-i386-1.tgz
; 
; Now i have 3 new  tcp/ip ports into my system: (thank Nmap) :-)
; 
; - 867 Open
; - 879 Open
; - 889 Open
; 
; Example:
; 
; telnet> open
; (to) 127.0.0.1 867
; Trying 127.0.0.1...
; Connected to 127.0.0.1.
; Escape character is '^]'.

Check them with fuser -n tcp 867 and so on, or netstat -tupan, it will
show you which process is bind()'ed to those ports.

; These ports are choice random from a range of  300 - 1200 !! and the size of
; the tgz is various for every mirror:
; 
; 628642 Sep 20 17:58 openssh-3.7.1p1-i386-1.tgz (from www.slackware.at)
; 628481 Sep 20 21:01 openssh-3.7p1-i386-1.tgz   (from www.slackware.com)

Sure they are, because openssh-3.7.1p1 != openssh-3.7p1

-- 
..... Robert Jaroszuk - zim@iq,pl - [ IQ PL Sp. z o.o. ] .....
GCS/IT/O d? s: a-- C++ ULB++++$ P+ L++++$ E--- W- N+ w-- O- M-
V- PS+ PE Y(+) PGP-(+++) t-- 5? X- R* tv-- DI++ b++>+++ DI- D-
... The superior warrior wins without fighting -- Sun Tzu. ...


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ