ProFTPd 어이없는 보안 사고..
글쓴이: 김정균 / 작성시간: 토, 2010/12/04 - 2:55오전
오늘 메일 box를 열고선 어이없는 메일을 보았습니다. 얼마전 ProFTPd에서 CVE-2010-3867 빨리 픽스하라고 중요 보안 버그라고 메일링을 보냈는데, 어제 다시 온 메일링을 보니, CVE-2010-3867에 의해서 뚫렸고, cracker가 이 버그를 픽스한 버전에 backdoor를 심어 놓았다고 하는 군요 --;
안녕 리눅스가 ProFTPd가 기본 패키지라서.. 뻘짓을 했습니다. 일단, 오늘 업데이트 해 놓았으니, pkgsysupdate를 cronjob으로 걸어 놓으신 분들은 알아서 업데이트가 될 것이고, 그래도 불안하신 분들은 버전 확인 하시고 1.3.3c-1 이 설치 되어 있으면 pkgsysupdate 한번 실행해 주시는 것을 권장 합니다.
그리고, ProFTPd korean user group의 package를 사용하시는 분들도 1.3.3ckr 버전 사용자 분들은 1.3.3ckr2 로 업데이트 하시기 바랍니다.
http://annyung.oops.org/?m=update&p=1.3&t=1291395965&n=308
http://proftpd.oops.org/notice.php?n_mode=detail&id=104
아래는 메일링 전문 입니다.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ProFTPD Compromise Report On Sunday, the 28th of November 2010 around 20:00 UTC the main distribution server of the ProFTPD project was compromised. The attackers most likely used an unpatched security issue in the FTP daemon to gain access to the server and used their privileges to replace the source files for ProFTPD 1.3.3c with a version which contained a backdoor. The unauthorized modification of the source code was noticed by Daniel Austin and relayed to the ProFTPD project by Jeroen Geilman on Wednesday, December 1 and fixed shortly afterwards. The fact that the server acted as the main FTP site for the ProFTPD project (<a href="http://ftp.proftpd.org" rel="nofollow">ftp.proftpd.org</a>) as well as the rsync distribution server (rsync.proftpd.org) for all ProFTPD mirror servers means that anyone who downloaded ProFTPD 1.3.3c from one of the official mirrors from 2010-11-28 to 2010-12-02 will most likely be affected by the problem. The backdoor introduced by the attackers allows unauthenticated users remote root access to systems which run the maliciously modified version of the ProFTPD daemon. Users are strongly advised to check systems running the affected code for security compromises and compile/run a known good version of the code. To verify the integrity of the source files, use the GPG signatures available on the FTP servers as well on the ProFTPD homepage at: <a href="http://www.proftpd.org/md5_pgp.html. The" rel="nofollow">http://www.proftpd.org/md5_pgp.html. The</a> MD5 sums for the source tarballs are: 8571bd78874b557e98480ed48e2df1d2 proftpd-1.3.3c.tar.bz2 4f2c554d6273b8145095837913ba9e5d proftpd-1.3.3c.tar.gz The PGP signatures for the source tarballs are: proftpd-1.3.3c.tar.bz2: -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEABECAAYFAkzLAWYACgkQt46JP6URl2qu3QCcDGXD+fRPOdKMp8fHyHI5d12E 83gAoPHBrjTFCz4MKYLhH8qqxmGslR2k =aLli -----END PGP SIGNATURE----- proftpd-1.3.3c.tar.gz: -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEABECAAYFAkzLAW0ACgkQt46JP6URl2ojfQCfXy/hWE8G5mhdhdLpaPUZsofK pO8Anj+uP0hQcn1E/CEUddI0mezlSCmg =e8el -----END PGP SIGNATURE----- The PGP key of TJ Saunders has been used to sign the source tarballs; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkz23FwACgkQt46JP6URl2pQ3QCfTWAZ8ZTGvruPD1pRJUpLM3gw hUsAoLI4YnmXVgUIVhU2vFWD1rOYffEY =3m3x -----END PGP SIGNATURE-----
댓글
헐... 무슨 그런..-.-;
에휴.. 고생이심다 ㅎㅎㅎ
-----새벽녘의 흡혈양파-----
패키지 시스템 - 바이너리든 소스든 - 들은 보통
패키지 시스템 - 바이너리든 소스든 - 들은 보통 signature 를 검사하나요? 하긴 이 경우에는 아예 signature 까지 바꿔버렸으면 답이 없겠군요 :(
댓글 달기