clarissa1996
Technical User
Hi all,
I have installed a firewall (at this moment for test purpose only) and a DMZ where I have a On all PCs I have SuSE linux installed.
Today I have experienced problems on the system where I have my The CPU activity was 98%.
A program whit the name ./t was in execution and in my /tmp directory 3 new source programs (and executables) are saved: e.c, t.c and p.c.
Is seems that this programs are called "exploits". This is new for my !!!!
I attach what I have found in my firewall log (see below). It seems me that my host (192.1.21.99) is trying to contact on source port 443 an external host (I have replaced the IP Address of this external host with "xxx.xxx.xx.xxx"
.
I attach the http/error.log too (see below).
Can someone tell me what's appens on my PC ?
Should I reinstall all ?
What is the possible risks ?
Best Regards. Clarissa
=====================================================
Here is the beginning of the sources (e.c, t.c and p.c):
/*
* Linux kernel mremap() bound checking bug exploit.
*
* Bug found by Paul Starzetz <paul isec pl>
*
* Copyright (c) 2004 iSEC Security Research. All Rights Reserved.
*
* THIS PROGRAM IS FOR EDUCATIONAL PURPOSES *ONLY* IT IS PROVIDED "AS IS"
* AND WITHOUT ANY WARRANTY. COPYING, PRINTING, DISTRIBUTION, MODIFICATION
* WITHOUT PERMISSION OF THE AUTHOR IS STRICTLY PROHIBITED.
*/
/* lame, oversophisticated local root exploit for kmod/ptrace bug in linux
* 2.2 and 2.4
*
* have fun
*/
/*
* Linux kernel ptrace/kmod local root exploit
*
* This code exploits a race condition in kernel/kmod.c, which creates
* kernel thread in insecure manner. This bug allows to ptrace cloned
* process, allowing to take control over privileged modprobe binary.
*
* Should work under all current 2.2.x and 2.4.x kernels.
*
* I discovered this stupid bug independently on January 25, 2003, that
* is (almost) two month before it was fixed and published by Red Hat
* and others.
*
* Wojciech Purczynski <cliph@isec.pl>
*
* THIS PROGRAM IS FOR EDUCATIONAL PURPOSES *ONLY*
* IT IS PROVIDED "AS IS" AND WITHOUT ANY WARRANTY
*
* (c) 2003 Copyright by iSEC Security Research
*/
============================================================
Here is the firewall log:
Feb 1 19:29:48 linux kernel: dmz-bad IN=eth0 OUT=eth1 SRC=192.1.21.99 DST=xxx.x
xx.xx.xxx LEN=93 TOS=0x00 PREC=0x00 TTL=63 ID=20324 DF PROTO=TCP SPT=443 DPT=606
54 WINDOW=7504 RES=0x00 ACK PSH URGP=0
Feb 1 19:31:46 linux kernel: dmz-bad IN=eth0 OUT=eth1 SRC=192.1.21.99 DST=xxx.x
xx.xx.xxx LEN=93 TOS=0x00 PREC=0x00 TTL=63 ID=20325 DF PROTO=TCP SPT=443 DPT=606
54 WINDOW=7504 RES=0x00 ACK PSH URGP=0
Feb 1 19:33:46 linux kernel: dmz-bad IN=eth0 OUT=eth1 SRC=192.1.21.99 DST=xxx.xxx.xx.xxx LEN=93 TOS=0x00 PREC=0x00 TTL=63 ID=20326 DF PROTO=TCP SPT=443 DPT=606
54 WINDOW=7504 RES=0x00 ACK PSH URGP=0
Feb 1 19:35:45 linux kernel: dmz-bad IN=eth0 OUT=eth1 SRC=192.1.21.99 DST=xxx.xxx.xx.xxx LEN=93 TOS=0x00 PREC=0x00 TTL=63 ID=20327 DF PROTO=TCP SPT=443 DPT=606
54 WINDOW=7504 RES=0x00 ACK PSH URGP=0
============================================================
Here is the http/error.log:
[Sun Feb 1 19:24:17 2004] [error] mod_ssl: SSL handshake failed (server new.hos
t.name:443, client xxx.xxx.xx.xxx) (OpenSSL library error follows)
[Sun Feb 1 19:24:17 2004] [error] OpenSSL: error:0406506C:rsa routines:RSA_EAY_
PRIVATE_DECRYPT:data greater than mod len
[Sun Feb 1 19:24:17 2004] [error] OpenSSL: error:140BB004:SSL routines:SSL_RSA_
PRIVATE_DECRYPT:nested asn1 error
[Sun Feb 1 19:24:17 2004] [error] OpenSSL: error:1406B0CE:SSL routines:GET_CLIE
NT_MASTER_KEY
roblems mapping cipher functions
[Sun Feb 1 19:25:24 2004] [error] mod_ssl: SSL handshake failed (server new.hos
t.name:443, client xx.xxx.xx.xxx) (OpenSSL library error follows)
[Sun Feb 1 19:25:24 2004] [error] OpenSSL: error:0406506C:rsa routines:RSA_EAY_
PRIVATE_DECRYPT:data greater than mod len
[Sun Feb 1 19:25:24 2004] [error] OpenSSL: error:140BB004:SSL routines:SSL_RSA_
PRIVATE_DECRYPT:nested asn1 error
[Sun Feb 1 19:25:24 2004] [error] OpenSSL: error:1406B0CE:SSL routines:GET_CLIE
NT_MASTER_KEY
roblems mapping cipher functions
I have installed a firewall (at this moment for test purpose only) and a DMZ where I have a On all PCs I have SuSE linux installed.
Today I have experienced problems on the system where I have my The CPU activity was 98%.
A program whit the name ./t was in execution and in my /tmp directory 3 new source programs (and executables) are saved: e.c, t.c and p.c.
Is seems that this programs are called "exploits". This is new for my !!!!
I attach what I have found in my firewall log (see below). It seems me that my host (192.1.21.99) is trying to contact on source port 443 an external host (I have replaced the IP Address of this external host with "xxx.xxx.xx.xxx"
I attach the http/error.log too (see below).
Can someone tell me what's appens on my PC ?
Should I reinstall all ?
What is the possible risks ?
Best Regards. Clarissa
=====================================================
Here is the beginning of the sources (e.c, t.c and p.c):
/*
* Linux kernel mremap() bound checking bug exploit.
*
* Bug found by Paul Starzetz <paul isec pl>
*
* Copyright (c) 2004 iSEC Security Research. All Rights Reserved.
*
* THIS PROGRAM IS FOR EDUCATIONAL PURPOSES *ONLY* IT IS PROVIDED "AS IS"
* AND WITHOUT ANY WARRANTY. COPYING, PRINTING, DISTRIBUTION, MODIFICATION
* WITHOUT PERMISSION OF THE AUTHOR IS STRICTLY PROHIBITED.
*/
/* lame, oversophisticated local root exploit for kmod/ptrace bug in linux
* 2.2 and 2.4
*
* have fun
*/
/*
* Linux kernel ptrace/kmod local root exploit
*
* This code exploits a race condition in kernel/kmod.c, which creates
* kernel thread in insecure manner. This bug allows to ptrace cloned
* process, allowing to take control over privileged modprobe binary.
*
* Should work under all current 2.2.x and 2.4.x kernels.
*
* I discovered this stupid bug independently on January 25, 2003, that
* is (almost) two month before it was fixed and published by Red Hat
* and others.
*
* Wojciech Purczynski <cliph@isec.pl>
*
* THIS PROGRAM IS FOR EDUCATIONAL PURPOSES *ONLY*
* IT IS PROVIDED "AS IS" AND WITHOUT ANY WARRANTY
*
* (c) 2003 Copyright by iSEC Security Research
*/
============================================================
Here is the firewall log:
Feb 1 19:29:48 linux kernel: dmz-bad IN=eth0 OUT=eth1 SRC=192.1.21.99 DST=xxx.x
xx.xx.xxx LEN=93 TOS=0x00 PREC=0x00 TTL=63 ID=20324 DF PROTO=TCP SPT=443 DPT=606
54 WINDOW=7504 RES=0x00 ACK PSH URGP=0
Feb 1 19:31:46 linux kernel: dmz-bad IN=eth0 OUT=eth1 SRC=192.1.21.99 DST=xxx.x
xx.xx.xxx LEN=93 TOS=0x00 PREC=0x00 TTL=63 ID=20325 DF PROTO=TCP SPT=443 DPT=606
54 WINDOW=7504 RES=0x00 ACK PSH URGP=0
Feb 1 19:33:46 linux kernel: dmz-bad IN=eth0 OUT=eth1 SRC=192.1.21.99 DST=xxx.xxx.xx.xxx LEN=93 TOS=0x00 PREC=0x00 TTL=63 ID=20326 DF PROTO=TCP SPT=443 DPT=606
54 WINDOW=7504 RES=0x00 ACK PSH URGP=0
Feb 1 19:35:45 linux kernel: dmz-bad IN=eth0 OUT=eth1 SRC=192.1.21.99 DST=xxx.xxx.xx.xxx LEN=93 TOS=0x00 PREC=0x00 TTL=63 ID=20327 DF PROTO=TCP SPT=443 DPT=606
54 WINDOW=7504 RES=0x00 ACK PSH URGP=0
============================================================
Here is the http/error.log:
[Sun Feb 1 19:24:17 2004] [error] mod_ssl: SSL handshake failed (server new.hos
t.name:443, client xxx.xxx.xx.xxx) (OpenSSL library error follows)
[Sun Feb 1 19:24:17 2004] [error] OpenSSL: error:0406506C:rsa routines:RSA_EAY_
PRIVATE_DECRYPT:data greater than mod len
[Sun Feb 1 19:24:17 2004] [error] OpenSSL: error:140BB004:SSL routines:SSL_RSA_
PRIVATE_DECRYPT:nested asn1 error
[Sun Feb 1 19:24:17 2004] [error] OpenSSL: error:1406B0CE:SSL routines:GET_CLIE
NT_MASTER_KEY
[Sun Feb 1 19:25:24 2004] [error] mod_ssl: SSL handshake failed (server new.hos
t.name:443, client xx.xxx.xx.xxx) (OpenSSL library error follows)
[Sun Feb 1 19:25:24 2004] [error] OpenSSL: error:0406506C:rsa routines:RSA_EAY_
PRIVATE_DECRYPT:data greater than mod len
[Sun Feb 1 19:25:24 2004] [error] OpenSSL: error:140BB004:SSL routines:SSL_RSA_
PRIVATE_DECRYPT:nested asn1 error
[Sun Feb 1 19:25:24 2004] [error] OpenSSL: error:1406B0CE:SSL routines:GET_CLIE
NT_MASTER_KEY