[prev in list] [next in list] [prev in thread] [next in thread] 

List:       incidents
Subject:    Re: cron exploit?
From:       Vinicius Moreira Mello <vinicius () lineone ! net>
Date:       2003-09-30 23:19:15
[Download RAW message or body]

Jeremy,

	May be it exploits an improper tmp file created by an application run
by root or an improper file permission that you haven't noticed.
Something I always do in systems that users log into is mounting
/tmp,/var with nodev,nosuid,noexec permissions, removing the compiler
and unsetting the suid bit of many executables, including crontab.

Gook luck,

--
Vinicius

Jeremy Hanmer wrote:
 > Unfortunately, the permissions were all fine.  The user apparently poked
 > around cron.daily, but there isn't any evidence that they were ever able
 > to successfully modify anything in there.  All files (and the directory
 > itself) were owned by root.root, and all were 755.  The *only* file
 > found modified by tripwire was /sbin/init.  Nothing else in any library
 > paths, bin paths, or /etc had been touched.
 >


---------------------------------------------------------------------------
----------------------------------------------------------------------------

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic