젠투리눅스 rsync 서버 compromised, GNU savannah server compr
글쓴이: 송지석 / 작성시간: 목, 2003/12/04 - 9:36오전
데비안에 이어 젠투도 공격받았네요..
Slashdot
포티지 파일들은 괜찮다고 합니다만..
이거 참.. 정말 Conspiracy하네요..
거기다 GNU 사바나 프로젝트 서버도 해킹당해서 (저번달에!) 이번달 초에 발견되었다네요...
http://savannah.gnu.org/statement.html
Forums:
젠투가 공격받은 게 아니고..
Daniel Robbins (Gentoo Chief Architect) 가 보낸 메일에 의하면
제목 그대로 rsync 서버 한 대가 공격 받은 겁니다.
그 서버는 젠투만 취급하는 건 아니라고 합니다.
그러니 젠투가 공격받았다고 하는 건 좀 어폐가 있다고 생각합니다.
메인 서버가 공격받은 데비안의 경우하고는 좀 다르지요.
아무튼 이런 일은 안 좋은 일이군요...
<전체내용>
From: Daniel Robbins <drobbins at gentoo.org>
To: gentoo-announce at gentoo.org, bugtraq at securityfocus.com
GENTOO LINUX SECURITY ANNOUNCEMENT 200312-01
- ---------------------------------------------------------------------------
GLSA: 200312-01
summary: rsync.gentoo.org rotation server compromised
severity: normal
date: 2003-12-02
CVE: None
exploit: remote
DESCRIPTION:
On December 2nd at approximately 03:45 UTC, one of the servers that makes up
the rsync.gentoo.org rotation was compromised via a remote exploit. At this
point, we are still performing forensic analysis. However, the compromised
system had both an IDS and a file integrity checker installed and we have a
very detailed forensic trail of what happened once the box was breached, so
weare reasonably confident that the portage tree stored on that box
wasunaffected.
The attacker appears to have installed a rootkit and modified/deleted some
files to cover their tracks, but left the server otherwise untouched. The box
was in a compromised state for approximately one hour before it was
discovered and shut down. During this time, approximately 20 users
synchronized against the portage mirror stored on this box. The method used
to gain access to the box remotely is still under investigation. We will
release more details once we have ascertained the cause of the remote
exploit.
This box is not an official Gentoo infrastructure box and is instead donated
by a sponsor. The box provides other services as well and the sponsor has
requested that we not publicly identify the box at this time. Because the
Gentoo part of this box appears to be unaffected by this exploit, we are
currently honoring the sponsor's request. That said, if at any point, we
determine that any file in the portage tree was modified in any way, we will
release full details about the compromised server.
SOLUTION:
Again, based on the forensic analysis done so far, we are reasonably
confident that no files within the Portage tree on the box were affected.
However, the server has been removed from all rsync.*.gentoo.org rotations
and will remain so until the forensic analysis has been completed and the box
has been wiped and rebuilt. Thus, users preferring an extra level of security
may ensure that they have a correct and accurate portage tree by running:
emerge sync
Which will perform a sync against another server and ensure that all files
are up to date.
exploitable heap overflow in rsync
http//www.securityfocus.com/archive/1/346486
http//lwn.net/Articles/61541/
GENTOO LINUX SECURITY ANNOUNCEMENT 200312-03
- ---------------------------------------------------------------------------
GLSA 200312-03
summary exploitable heap overflow in rsync
severity high
date 2003-12-04
exploit remote
affected <2.5.6*
fixed >=2.5.7
DESCRIPTION
Rsync version 2.5.6 contains a vulnerability that can be used to run
arbitrary code. The Gentoo infrastructure team has some reasonably good
forensic evidence that this exploit may have been used in combination with
the Linux kernel brk vulnerability (see GLSA 200312-02) to exploit a
rsync.gentoo.org rotation server (see GLSA-200312-01.)
Please see http//lwn.net/Articles/61541/ for the security advisory released
by the rsync development team.
이래저래 많이 바쁘네요 ><
-_-;
왜 좋은일하고 있는 사람들을 건드는건지..
전형적인 범죄자 스타일 해커들인듯..
No Pain, No Gain.