Gentoo Archives: gentoo-user

From: Adam Carter <adamcarter3@×××××.com>
To: "gentoo-user@l.g.o" <gentoo-user@l.g.o>
Subject: Re: [gentoo-user] Ghost cyber threat
Date: Mon, 02 Feb 2015 00:15:02
Message-Id: CAC=wYCGHgvKO3d25Lv+-duGwTqJG4_0YqvmKc44XjWZM5sR=uQ@mail.gmail.com
In Reply to: Re: [gentoo-user] Ghost cyber threat by shawn wilson
1 >
2 > >> > Do they need telnet or ssh access,
3 > >>
4 >
5 > Not telnet shell but this could be triggered with telnet/nc or even nmap,
6 > hping, or tcpreplay - all of which could send an arbitrary payload to tcp
7 > or udp ports.
8 >
9 For clarity, its probably best to specify if we're talking about client or
10 server end. The original question was whether telnet or ssh access was
11 required, that is, does the attacker require access to the telnetd or sshd.
12 In GHOSTs case the answer is no, but if the attacker does have access and
13 an account, all they need to do is execute a local binary that uses the
14 older gethostbyname function rather than the newer getaddrinfo function,
15 and pass it a long hostname to lookup. However, in this case its considered
16 a local attack.
17
18 The attackers tool of choice (client end) will depend on personal
19 preference and the network service that provides the access for the attack.