On Sun, 2 Jan 2000, Michael Hatchard wrote:

> Someone has hacked into our system.
> I'm not quite sure how he is getting in.

He's almost certainly using the "RSA buffer overrun" exploit in ssh.
Try replacing ssh with OpenSSH from
ftp://ftp.redhat.de/pub/rh-addons/security/

> pico

I've never seen anyone with a lot of Unix experience use pico as his
primary editor. It's probably a script kiddie without much of a clue.

> pico /etc/inetd.conf
> killall -9 inetd

You'll want to check your inetd.conf. He might have added a "feature" like
"telnet to port xyz to get a rootshell without needing a password", either
by calling /bin/sh directly or by calling the uid thing he put on your
system.

> File uid.c contains
> #include <unistd.h>
> main ()
> {
> setguid(0)
> setuid(0)
> excel("/bin/sh","/bin/sh",NULL);
> }

A wrapper to /bin/sh

> There are also new config files for ssh in /etc

Completely remove ssh and all its config files, and install the OpenSSH
RPMs.

LLaP
bero

-- 
Nobody will ever need more than 640 kB RAM.
                -- Bill Gates, 1983
Windows 98 requires 16 MB RAM.
                -- Bill Gates, 1999
Nobody will ever need Windows 98.
                -- logical conclusion


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to