Gentoo Archives: gentoo-security

From: Marc Ballarin <Ballarin.Marc@×××.de>
To: Rui Pedro Figueira Covelo <rpfc@××××××××××××.pt>
Cc: gentoo-security@l.g.o
Subject: Re: [gentoo-security] [Fwd: [Full-Disclosure] Re: Automated SSH login attempts?]
Date: Fri, 30 Jul 2004 07:59:35
Message-Id: 20040730095957.7f6842a6.Ballarin.Marc@gmx.de
In Reply to: Re: [gentoo-security] [Fwd: [Full-Disclosure] Re: Automated SSH login attempts?] by Rui Pedro Figueira Covelo
1 On Thu, 29 Jul 2004 21:25:48 +0100
2 Rui Pedro Figueira Covelo <rpfc@××××××××××××.pt> wrote:
3
4 > -----BEGIN PGP SIGNED MESSAGE-----
5 > Hash: SHA1
6 >
7 > I noticed that the .bash_history it's from the root account. Not guest
8 > or test. If this .bash_history is real, the fact that someone got root
9 > proves that someone used an exploit rather than guessing a weak password
10 > of a guest or test account, right?
11 >
12
13 The listing at
14
15 http://www.mail-archive.com/debian-user%40lists.debian.org/msg110879.html
16
17 shows a tool called "brk" use by the intruder. It's still online, and
18 seems to be the infamous do_brk() exploit.
19
20 Obviously the attacker is using those weird accounts to get unpriviliged
21 acces and in then trying to become root through the do_brk() vulnerability
22 found in older kernels.
23
24 Two separate weaknesses, nothing to fear for an up to date system.
25
26 Regards
27
28 --
29 gentoo-security@g.o mailing list