Discussion:
Another exploit against apache or kernel
(too old to reply)
Adrian Senn
2005-05-10 21:57:40 UTC
Permalink
Hello together
Since some weeks we have an intruder which is exploiting us and poisoning us
with the Virus Unix/RST.A
I found now how it happens at it isn't clear to me what he is doing.

I found in the apache log file some interesting strings.

Repeating entries as this
ip-hide - - [10/May/2005:19:58:00 +0200] "\v\xa5\xe5)(\xdd\xb7|\xd5\xad&\xd79" 400 - "-" "-"

and sometimes this one
ip-hide - - [10/May/2005:19:58:20 +0200]
"f\x0e\xbcQ\xc4k\x01\xe4l\x02]\xbe\xbaye\x96\x87\xa5\xfc#\xc5\x17f\x0e\xbcQ\xc4k\x01\xe4l\x02]\xbe\xbaye\x96\x87\xa5\xfc#\xc5\x17"
200 11466 "-" "-"

I had the possibility to made a tcpdump of this session of the cracker.

It doesn't initiate a normal http session. After the treeway handshake
he is sending (HTTP: Continuation or non-HTTP traffic")

0000: 0B A5 E5 29 28 DD B7 7C D5 AD 26 D7 39 00 7E E1 ...)(..|..&.9.~.
0010: D7 CE 46 BA C5 11 ..F...

After this, our server is also initiating a session from an non privileged Port
to an unprivileged port on the other side.

He is also sending this string

0000: 66 0E BC 51 C4 6B 01 E4 6C 02 5D BE BA 79 65 96 f..Q.k..l.]..ye.
0010: 87 A5 FC 23 C5 17 ...#..

after this the server is answering with a 200 message.

I don't have any idea why our server is opening a separate session to the crackers ip.
Could this to be an exploit against the kernel or php?
I made last week a change from the older apache 1.3.26 to 1.3.33 but the problem remains.
Could this also probably be an rootkit which is answering?

Kind regards Adrian Senn


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Paul Schmehl
2005-05-10 22:04:41 UTC
Permalink
Post by Adrian Senn
Since some weeks we have an intruder which is exploiting us and poisoning us
with the Virus Unix/RST.A
I found now how it happens at it isn't clear to me what he is doing.
I found in the apache log file some interesting strings.
Repeating entries as this
ip-hide - - [10/May/2005:19:58:00 +0200]
"\v\xa5\xe5)(\xdd\xb7|\xd5\xad&\xd79" 400 - "-" "-"
Have you not heard of mod_security?
SecFilterSelective THE_REQUEST "ip-hide" would stop this attack cold.

So would:
SecFilterSelective THE_REQUEST "\.\."

<http://www.modsecurity.org/>

Paul Schmehl (***@utdallas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Frank Knobbe
2005-05-11 06:54:49 UTC
Permalink
Post by Paul Schmehl
SecFilterSelective THE_REQUEST "ip-hide" would stop this attack cold.
Paul, I think Adrian put "ip-hide" in there to mask his server's IP
address in the log. It's not part of the web request the external party
made.

Cheers,
Frank

Loading...