Hi All,

I believe that a number of people on this list are running Trixbox and I haven't seen any mention of this on the list, but there is a remote exploit doing the rounds, for all versions of Trixbox upto and including the latest (2.6.1).

I believe there is a bot running and automatically exploiting vulnerable boxes.

See more details here
http://trixbox.org/forums/trixbox-forums/open-discussion/critical-remote-root-exploit-trixbox-wild

As of now, there is no update from Fonality correcting the problem.

If running Trixbox, you are only vulnerable if your box is directly on the internet and port 80 or 443 is exposed.

The problem is in the file /var/www/html/user/index.php

A quick workaround (if you haven't been infected) is to rename this file until a fix becomes available.

One way to check whether you have been "infected" by this particular bot is to run the following command

netstat -tuna | grep 6667

if you get a result, it means that your box has made an irc (port 6667) connection to a server (a typical method of controlling bots)

In my research, I also found a process called httpdse (ps aux | grep httpdse) which appeared to belong to the bot. There was also a file in /tmp called .k and variations thereof which contained the executable code.

Hope this helps

Martin






---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to