File: 1791.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (70 lines) | stat: -rw-r--r-- 1,395 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Rule:  

--
Sid:
1791

--
Summary:
This event indicates that a backdoor may be installed on a machine.

--
Impact:
One of the systems may have been compromised.

--
Detailed Information:
www.monkey.org, the system that hosts fragroute was compromised and the fragroute
source code was modified to contain a back door.  The code was corrupted on 
May 17, 2002.  Versions after May 31, 2002  and before May 17, 2002 do not contain the backdoor.

--
Affected Systems:

Systems running
	dsniff 2.3
	fragroute 1.2
	fragrouter 1.6

--
Attack Scenarios:
The backdoor contacts the IP address 216.80.99.202.  A person connecting from that
address can use the backdoor to acquire full control over the compromised machine.  

--
Ease of Attack:
Simple.

--
False Positives:
While the IP address flagged in this rule was associated with the backdoor at the time
fragroute was trojaned, it may now or in the future be used by unrelated parties.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to a new version of fragroute and sanitize the trojaned machine.   

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>

-- 
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/4898
http://www.securityfocus.com/archive/1/274927






--