That logging appears because those users have setup cron jobs and an
entry is generated every time a job is started. This is fixed in sid
(by not using pam's session-interactive) but does not mean you have
been hacked through cron.

Regards

Javier

2010/3/29, Oz Nahum <nahu...@gmail.com>:
> Package: cron
> Version: 3.0pl1-106
> Justification: root security hole
> Severity: critical
> Tags: security
>
> Hi Guys,
>
> I am by no means a security expert.
> I noticed my server was breached and multiple accounts on it have been
> logging via cron over and over again.
>
> From the auth log:
> Mar 29 10:30:01 sinbra CRON[5643]: pam_unix(cron:session): session opened
> for user arun by (uid=0)
> Mar 29 10:30:01 sinbra CRON[5642]: pam_unix(cron:session): session closed
> for user michael
> Mar 29 10:30:01 sinbra CRON[5643]: pam_unix(cron:session): session closed
> for user arun
> Mar 29 10:31:01 sinbra CRON[5729]: pam_unix(cron:session): session opened
> for user arun by (uid=0)
> Mar 29 10:31:01 sinbra CRON[5728]: pam_unix(cron:session): session opened
> for user michael by (uid=0)
> Mar 29 10:31:01 sinbra CRON[5728]: pam_unix(cron:session): session closed
> for user michael
> Mar 29 10:31:01 sinbra CRON[5729]: pam_unix(cron:session): session closed
> for user arun
> Mar 29 10:32:01 sinbra CRON[5822]: pam_unix(cron:session): session opened
> for user michael by (uid=0)
> Mar 29 10:32:01 sinbra CRON[5823]: pam_unix(cron:session): session opened
> for user arun by (uid=0)
> Mar 29 10:32:01 sinbra CRON[5822]: pam_unix(cron:session): session closed
> for user michael
> Mar 29 10:32:01 sinbra CRON[5823]: pam_unix(cron:session): session closed
> for user arun
>
> as soon as I removed cron, these session openings where stopped.
>
> I removed cron with the --purge flag, and manually erased everything in the
> /etc/ directory which realted to cron.
> I then restarted the computer,
>
> However, as soon as I re-installed cron, these session openings via uid=0
> started again.
>
> There is a high possibility I'm wrong, and this is not related to cron, so
> feel free to downgrade this bug.
>
> Thanks Oz.
>
> -- System Information:
> Debian Release: squeeze/sid
>   APT prefers testing
>   APT policy: (990, 'testing'), (700, 'stable')
> Architecture: i386 (i686)
>
> Kernel: Linux 2.6.32-trunk-686 (SMP w/1 CPU core)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
>
> Versions of packages cron depends on:
> ii  adduser                       3.112      add and remove users and groups
> ii  debianutils                   3.2.2      Miscellaneous utilities
> specific t
> ii  libc6                         2.10.2-6   Embedded GNU C Library: Shared
> lib
> ii  libpam0g                      1.1.1-2    Pluggable Authentication
> Modules l
> ii  libselinux1                   2.0.89-4   SELinux runtime shared
> libraries
> ii  lsb-base                      3.2-23     Linux Standard Base 3.2 init
> scrip
>
> Versions of packages cron recommends:
> pn  exim4 | postfix | mail-transp <none>     (no description available)
> ii  lockfile-progs                0.1.13     Programs for locking and
> unlocking
>
> Versions of packages cron suggests:
> ii  anacron                       2.3-14     cron-like program that doesn't
> go
> ii  checksecurity                 2.0.13     basic system security checks
> ii  logrotate                     3.7.8-4    Log rotation utility
>



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to