Hey ... isn't this a repeat advisory  - quite some time ago - about a year ago - this 
or something like this was 
released earlier. ??? 


Raju Mathur <[EMAIL PROTECTED]> said:

> This is an RFC 1153 digest.
> (1 message)
> ----------------------------------------------------------------------
> 
> Message-Id: <[EMAIL PROTECTED]>
> From: CERT Advisory <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: CERT Advisory CA-2002-30 Trojan Horse tcpdump and libpcap Distributions
> Date: Wed, 13 Nov 2002 15:14:46 -0500
> 
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> CERT Advisory CA-2002-30 Trojan Horse tcpdump and libpcap Distributions
> 
>    Original issue date: November 13, 2002
>    Last revised: --
>    Source: CERT/CC
> 
>    A complete revision history is at the end of this file.
> 
> Overview
> 
>    The  CERT/CC  has received reports that several of the released source
>    code  distributions  of the libpcap and tcpdump packages were modified
>    by an intruder and contain a Trojan horse.
> 
>    We  strongly  encourage  sites  that  use, redistribute, or mirror the
>    libpcap  or  tcpdump  packages  to immediately verify the integrity of
>    their distribution.
> 
> I. Description
> 
>    The  CERT/CC  has received reports that some copies of the source code
>    for  libpcap,  a  packet  acquisition  library, and tcpdump, a network
>    sniffer, have been modified by an intruder and contain a Trojan horse.
> 
>    The  following  distributions  were  modified to include the malicious
>    code:
> 
>      tcpdump
> 
>        md5sum 3a1c2dd3471486f9c7df87029bf2f1e9 tcpdump-3.6.2.tar.gz
>        md5sum 3c410d8434e63fb3931fe77328e4dd88 tcpdump-3.7.1.tar.gz
> 
>      libpcap
> 
>        md5sum 73ba7af963aff7c9e23fa1308a793dca libpcap-0.7.1.tar.gz
> 
>    These  modified  distributions  began  to appear in downloads from the
>    HTTP server www.tcpdump.org on or around Nov 11 2002 10:14:00 GMT. The
>    tcpdump  development  team  disabled  download  of  the  distributions
>    containing  the Trojan horse on Nov 13 2002 15:05:19 GMT. However, the
>    availability  of  these distributions from mirror sites is unknown. At
>    this  time,  it  does not appear that related projects such as WinPcap
>    and WinDump contain this Trojan horse.
> 
>    The  Trojan  horse  version  of  the  tcpdump source code distribution
>    contains  malicious  code  that  is run when the software is compiled.
>    This code, executed from the tcpdump configure script, will attempt to
>    connect  (via wget, lynx, or fetch) to port 80/tcp on a fixed hostname
>    in  order  to  download  a  shell script named services. In turn, this
>    downloaded  shell script is executed to generate a C file (conftes.c),
>    which is subsequently compiled and run.
> 
>    When  executed,  conftes.c  makes an outbound connection to a fixed IP
>    address  (corresponding  to  the  fixed hostname used in the configure
>    script)  on  port  1963/tcp  and  reads  a single byte. Three possible
>    values for this downloaded byte are checked, each causing conftes.c to
>    respond in different ways:
> 
>      * 'A' will cause the Trojan horse to exit
> 
>      * 'D'  will  cause  the  Trojan  to  fork itself, spawn a shell, and
>        redirect  this  shell  to  the  connected  IP  address  (Note that
>        communication  to  and from this shell is obfuscated by XORing all
>        bytes with the constant 0x89.)
> 
>      * 'M'  will cause the Trojan horse to close the connection and sleep
>        for 3600 seconds
> 
>    To  mask  the  activity  of this Trojan horse in tcpdump, libpcap, the
>    underlying  packet-capture  library  of  tcpdump,  has  been  modified
>    (gencode.c) to explicitly ignore all traffic on port 1963 (i.e., a BPF
>    expression of "not port 1963").
> 
> II. Impact
> 
>    An intruder operating from (or able to impersonate) the remote address
>    specified  in the malicious code could gain unauthorized remote access
>    to any host that compiled a version of tcpdump with this Trojan horse.
>    The  privilege level under which this malicious code would be executed
>    would be that of the user who compiled the source code.
> 
> III. Solution
> 
>    We   encourage   sites   using  libpcap  and  tcpdump  to  verify  the
>    authenticity  of  their  distribution,  regardless  of  where  it  was
>    obtained.
> 
>    Where to get libpcap and tcpdump
> 
>    While the compromise of these distributions is being investigated, the
>    tcpdump   and   libpcap  maintainers  recommend  using  the  following
>    distribution sites:
> 
>           http://sourceforge.net/projects/tcpdump/
>           http://sourceforge.net/projects/libpcap/
> 
>    Sites  that  mirror  the  source  code  are  encouraged  to verify the
>    integrity of their sources. We also encourage users to inspect any and
>    all  other software that may have been downloaded from the compromised
>    site.  Note  that  it  is  not sufficient to rely on the timestamps or
>    sizes  of  the file when trying to determine whether or not you have a
>    copy of the Trojan horse version.
> 
>    Verifying checksums
> 
>    The MD5 hashes of the vendor suggested updates for libpcap and tcpdump
>    are as follows:
> 
>      tcpdump
> 
>        md5sum 03e5eac68c65b7e6ce8da03b0b0b225e tcpdump-3.7.1.tar.gz
> 
>      libpcap
> 
>        md5sum 0597c23e3496a5c108097b2a0f1bd0c7 libpcap-0.7.1.tar.gz
> 
>    As a matter of good security practice, the CERT/CC encourages users to
>    verify,  whenever  possible, the integrity of downloaded software. For
>    more information, see
> 
>           http://www.cert.org/incident_notes/IN-2001-06.html
> 
> Appendix A. - Vendor Information
> 
>    This  appendix  contains  information  provided  by  vendors  for this
>    advisory.  As  vendors  report new information to the CERT/CC, we will
>    update this section and note the changes in our revision history. If a
>    particular  vendor  is  not  listed  below, we have not received their
>    comments.
> 
> Conectiva
> 
>      We  have  checked all our released libpcap and tcpdump packages and
>      confirmed that they do not contain the trojan code.
> 
> Debian
> 
>      Problematic  packages  are  only  distributed in Debian/unstable. I
>      have  examined  both  source  packages and they did not contain the
>      trojan  code  the  HLUG  reported on their web page. Hence, I guess
>      that Debian distributes safe source.
> 
> MontaVista Software, Inc.
> 
>      We  have  examined  our  sources, and our software does not contain
>      this trojan. We are not vulnerable to this advisory.
> 
> SuSE
> 
>      SuSE Linux products are not vulnerable.
>      _________________________________________________________________
> 
>    Feedback can be directed to the author: Roman Danyliw, Chad Dougherty.
>    ______________________________________________________________________
> 
>    This document is available from:
>    http://www.cert.org/advisories/CA-2002-30.html
>    ______________________________________________________________________
> 
> CERT/CC Contact Information
> 
>    Email: [EMAIL PROTECTED]
>           Phone: +1 412-268-7090 (24-hour hotline)
>           Fax: +1 412-268-6989
>           Postal address:
>           CERT Coordination Center
>           Software Engineering Institute
>           Carnegie Mellon University
>           Pittsburgh PA 15213-3890
>           U.S.A.
> 
>    CERT/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  /
>    EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies
>    during other hours, on U.S. holidays, and on weekends.
> 
> Using encryption
> 
>    We  strongly  urge you to encrypt sensitive information sent by email.
>    Our public PGP key is available from
>    http://www.cert.org/CERT_PGP.key
> 
>    If  you  prefer  to  use  DES,  please  call the CERT hotline for more
>    information.
> 
> Getting security information
> 
>    CERT  publications  and  other security information are available from
>    our web site
>    http://www.cert.org/
> 
>    To  subscribe  to  the CERT mailing list for advisories and bulletins,
>    send  email  to [EMAIL PROTECTED] Please include in the body of your
>    message
> 
>    subscribe cert-advisory
> 
>    *  "CERT"  and  "CERT  Coordination Center" are registered in the U.S.
>    Patent and Trademark Office.
>    ______________________________________________________________________
> 
>    NO WARRANTY
>    Any  material furnished by Carnegie Mellon University and the Software
>    Engineering  Institute  is  furnished  on  an  "as is" basis. Carnegie
>    Mellon University makes no warranties of any kind, either expressed or
>    implied  as  to  any matter including, but not limited to, warranty of
>    fitness  for  a  particular purpose or merchantability, exclusivity or
>    results  obtained from use of the material. Carnegie Mellon University
>    does  not  make  any warranty of any kind with respect to freedom from
>    patent, trademark, or copyright infringement.
>      _________________________________________________________________
> 
>    Conditions for use, disclaimers, and sponsorship information
> 
>    Copyright 2002 Carnegie Mellon University.
> 
>    Revision History
>      November 13, 2002: Initial release
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 6.5.8
> 
> iQCVAwUBPdKvMWjtSoHZUTs5AQGZMQP8DcGYT+7eGybHZv/npf6vXvnnSBkP0J3C
> K+vmcr3GttVUjpCQLHZsEUi6j8PBD0LeJyml27BSfpk1zkvJ1XTQJHw/mmagmoHz
> rhSCeNDQcxYmPlr+NdDzT9lnJkGAKEsd+/SSNlTUb556VjjR3dYnJB11w1LDyYzE
> bnB5WCmOUew=
> =UFH/
> -----END PGP SIGNATURE-----
> 
> ------------------------------
> 
> End of this Digest
> ******************
> 
> -- 
> Raju Mathur               [EMAIL PROTECTED]      http://kandalaya.org/
>                       It is the mind that moves
> 
>           ================================================
> To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject 
>header. Check archives at 
http://www.mail-archive.com/ilugd%40wpaa.org
> 



-- 
Regards,
Alok Sinha
G8.Net P Ltd
E-43, Krishna Park
New Delhi, India 110 062
http://www.g8.net



________________________________________________________________
Message sent using G8WebMail
For more information on the G8 Webmail, visit http://www.g8.net

          ================================================
To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject 
header. Check archives at http://www.mail-archive.com/ilugd%40wpaa.org

Reply via email to