Koozali.org: home of the SME Server

Results of rkhunter

Offline fergro

  • **
  • 24
  • +0/-0
Results of rkhunter
« on: November 24, 2005, 08:38:27 AM »
Hi all

Have had an incident where a sme 6.0.1-01 server was accessed and tampered with. I found two root kits on the server and extra files after running rkhunter. It also showed up four vunerabilities for the following

GnuPG 1.0.7 [ Vulnerable ]
Apache 1.3.27 [ Vulnerable ]
OpenSSL 0.9.6b [ Unknown ]
ProFTPd 1.2.9 [ Vulnerable ]

Have rebuilt the server and loaded all the Updates as per link by Gordon Rowell shown below. Ran rkhunter again same result.

Is it something I am doing wrong or as in one thread as Charlie Brady indicated rkhunter may have got it wrong.

Any advice welcome

Thank

robf
Fergro



Hi Gordon

Thanks for the reply, Have just done a clean install of sme 6.0.1-01. Installed all the updates on the link you sent.'
Installed and ran rkhunter and got the same result. Supplied the log, towards the bottom lists the possible vunerabilites.

Hope this is enough info

Rob F
fergro


/usr/bin/which                                             [ OK ]
   /usr/bin/who                                               [ OK ]
   /usr/bin/whoami                                            [ OK ]
   /usr/sbin/adduser                                          [ OK ]
   /usr/sbin/chroot                                           [ OK ]
   /usr/sbin/kudzu                                            [ OK ]
   /usr/sbin/tcpd                                             [ OK ]
   /usr/sbin/useradd                                          [ OK ]
   /usr/sbin/usermod                                          [ OK ]
   /usr/sbin/vipw                                             [ OK ]
   /usr/sbin/xinetd                                           [ OK ]
  Performing 'known good' check...

[Press <ENTER> to continue]



Check rootkits
* Default files and directories
   Rootkit '55808 Trojan - Variant A'...                      [ OK ]
   ADM Worm...                                                [ OK ]
   Rootkit 'AjaKit'...                                        [ OK ]
   Rootkit 'aPa Kit'...                                       [ OK ]
   Rootkit 'Apache Worm'...                                   [ OK ]
   Rootkit 'Ambient (ark) Rootkit'...                         [ OK ]
   Rootkit 'Balaur Rootkit'...                                [ OK ]
   Rootkit 'BeastKit'...                                      [ OK ]
   Rootkit 'beX2'...                                          [ OK ]
   Rootkit 'BOBKit'...                                        [ OK ]
   Rootkit 'CiNIK Worm (Slapper.B variant)'...                [ OK ]
   Rootkit 'Danny-Boy's Abuse Kit'...                         [ OK ]
   Rootkit 'Devil RootKit'...                                 [ OK ]
   Rootkit 'Dica'...                                          [ OK ]
   Rootkit 'Dreams Rootkit'...                                [ OK ]
   Rootkit 'Duarawkz'...                                      [ OK ]
   Rootkit 'Flea Linux Rootkit'...                            [ OK ]
   Rootkit 'FreeBSD Rootkit'...                               [ OK ]
   Rootkit 'Fuckit Rootkit'...                               [ OK ]
   Rootkit 'GasKit'...                                        [ OK ]
   Rootkit 'Heroin LKM'...                                    [ OK ]
   Rootkit 'HjC Kit'...                                       [ OK ]
   Rootkit 'ignoKit'...                                       [ OK ]
   Rootkit 'ImperalsS-FBRK'...                                [ OK ]
   Rootkit 'Irix Rootkit'...                                  [ OK ]
   Rootkit 'Kitko'...                                         [ OK ]
   Rootkit 'Knark'...                                         [ OK ]
   Rootkit 'Li0n Worm'...                                     [ OK ]
   Rootkit 'Lockit / LJK2'...                                 [ OK ]
   Rootkit 'MRK'...                                           [ OK ]
   Rootkit 'Ni0 Rootkit'...                                   [ OK ]
   Rootkit 'RootKit for SunOS / NSDAP'...                     [ OK ]
   Rootkit 'Optic Kit (Tux)'...                               [ OK ]
   Rootkit 'Oz Rootkit'...                                    [ OK ]
   Rootkit 'Portacelo'...                                     [ OK ]
   Rootkit 'R3dstorm Toolkit'...                              [ OK ]
   Rootkit 'RH-Sharpe's rootkit'...                           [ OK ]
   Rootkit 'RSHA's rootkit'...                                [ OK ]
   Sebek LKM                                                  [ OK ]
   Rootkit 'Scalper Worm'...                                  [ OK ]
   Rootkit 'Shutdown'...                                      [ OK ]
   Rootkit 'SHV4'...                                          [ OK ]
   Rootkit 'SHV5'...                                          [ OK ]
   Rootkit 'Sin Rootkit'...                                   [ OK ]
   Rootkit 'Slapper'...                                       [ OK ]
   Rootkit 'Sneakin Rootkit'...                               [ OK ]
   Rootkit 'Suckit Rootkit'...                                [ OK ]
   Rootkit 'SunOS Rootkit'...                                 [ OK ]
   Rootkit 'Superkit'...                                      [ OK ]
   Rootkit 'TBD (Telnet BackDoor)'...                         [ OK ]
   Rootkit 'TeLeKiT'...                                       [ OK ]
   Rootkit 'T0rn Rootkit'...                                  [ OK ]
   Rootkit 'Trojanit Kit'...                                  [ OK ]
   Rootkit 'Tuxtendo'...                                      [ OK ]
   Rootkit 'URK'...                                           [ OK ]
   Rootkit 'VcKit'...                                         [ OK ]
   Rootkit 'Volc Rootkit'...                                  [ OK ]
   Rootkit 'X-Org SunOS Rootkit'...                           [ OK ]
   Rootkit 'zaRwT.KiT Rootkit'...                             [ OK ]

* Suspicious files and malware
   Scanning for known rootkit strings
                         [ OK ]
   Scanning for known rootkit files                           [ OK ]
   Testing running processes...                               [ OK ]
   Miscellaneous Login backdoors                              [ OK ]
   Miscellaneous directories                                  [ OK ]
   Software related files                                     [ OK ]
   Sniffer logs                                               [ OK ]

[Press <ENTER> to continue]

* Trojan specific characteristics
   shv4
     Checking /etc/rc.d/rc.sysinit
       Test 1                                                 [ Clean ]
       Test 2                                                 [ Clean ]
       Test 3                                                 [ Clean ]
     Checking /etc/inetd.conf                                 [ Not found ]
     Checking /etc/xinetd.conf                                [ Clean ]

* Suspicious file properties
   chmod properties
     Checking /bin/ps                                         [ Clean ]
     Checking /bin/ls                                         [ Clean ]
     Checking /usr/bin/w                                      [ Clean ]
     Checking /usr/bin/who                                    [ Clean ]
     Checking /bin/netstat                                    [ Clean ]
     Checking /bin/login                                      [ Clean ]
   Script replacements
     Checking /bin/ps                                         [ Clean ]
     Checking /bin/ls                                         [ Clean ]
     Checking /usr/bin/w                                      [ Clean ]
     Checking /usr/bin/who                                    [ Clean ]
     Checking /bin/netstat                                    [ Clean ]
     Checking /bin/login                                      [ Clean ]

* OS dependant tests

   Linux
     Checking loaded kernel modules...                        [ OK ]
     Checking files attributes
                                [ OK ]
     Checking LKM module path                                 [ OK ]


Networking
* Check: frequently used backdoors
  Port 2001: Scalper Rootkit                                  [ OK ]
  Port 2006: CB Rootkit                                       [ OK ]
  Port 2128: MRK                                              [ OK ]
  Port 14856: Optic Kit (Tux)                                 [ OK ]
  Port 47107: T0rn Rootkit                                    [ OK ]
  Port 60922: zaRwT.KiT                                       [ OK ]

* Interfaces
     Scanning for promiscuous interfaces                      [ OK ]

[Press <ENTER> to continue]


System checks
* Allround tests
   Checking hostname... Found. Hostname is mail
   Checking for passwordless user accounts... OK
   Checking for differences in user accounts...                       [ NA ]
   Checking for differences in user groups... Creating file It seems this is you r first time.
   Checking boot.local/rc.local file...
     - /etc/rc.local                                          [ OK ]
     - /etc/rc.d/rc.local                                     [ OK ]
     - /usr/local/etc/rc.local                                [ Not found ]
     - /usr/local/etc/rc.d/rc.local                           [ Not found ]
     - /etc/conf.d/local.start                                [ Not found ]
     - /etc/init.d/boot.local                                 [ Not found ]
   Checking rc.d files...
     Processing........................................
               ........................................
               ........................................
               ........................................
               ........................................
               ........................................
               ........................................
               ........................................
               ........................................
               ..............................
   Result rc.d files check                                    [ OK ]
   Checking history files
     Bourne Shell                                             [ OK ]

* Filesystem checks
   Checking /dev for suspicious files...                      [ OK ]
   Scanning for hidden files...                               [ OK ]

[Press <ENTER> to continue]



Application advisories
* Application scan
   Checking Apache2 modules ...                               [ Not found ]
   Checking Apache configuration ...                          [ OK ]

* Application version scan
   - GnuPG 1.0.7                                              [ Old or patched v
ersion ]
   - Apache 1.3.27                                            [ Old or patched v
ersion ]
   - OpenSSL 0.9.6b                                           [ Old or patched v
ersion ]
   - PHP [unknown]                                            [ OK ]
   - Procmail MTA 3.22                                        [ OK ]
   - ProFTPd 1.2.9                                            [ Old or patched v
ersion ]
   - OpenSSH 3.7.1p1                                          [ OK ]



Security advisories
* Check: Groups and Accounts
   Searching for /etc/passwd...                               [ Found ]
   Checking users with UID '0' (root)...                      [ OK ]

* Check: SSH
   Searching for sshd_config...
   Found /etc/ssh/sshd_config
   Checking for allowed root login... Watch out Root login possible. Possible ri sk!
    info: PermitRootLogin yes
    Hint: See logfile for more information about this issue
   Checking for allowed protocols...                          [ Warning (SSH v1
allowed) ]

* Check: Events and Logging
   Search for syslog configuration...                         [ OK ]
   Checking for running syslog slave...                       [ OK ]
   Checking for logging to remote system...                   [ OK (no remote lo
gging) ]

[Press <ENTER> to continue]



---------------------------- Scan results ----------------------------

MD5
MD5 compared: 0
Incorrect MD5 checksums: 0

File scan
Scanned files: 342
Possible infected files: 0

Application scan
Vulnerable applications: 4

Scanning took 98 seconds

-----------------------------------------------------------------------

Do you have some problems, undetected rootkits, false positives, ideas or suggestions?
Please e-mail me by filling in the contact form (@http://www.rootkit.nl)
 

-----Original Message-----
From: Gordon Rowell [mailto:gordonr@gormand.com.au]
Sent: Thursday, 24 November 2005 3:34 PM
To: Leigh @ FCS
Cc: security@contribs.org
Subject: Re: [contribs-security] rkhunter vulnerabilities listed!!

Leigh @ FCS wrote:
> Hello
>  
> Have read the threads that talk about rkhunter listing files to be
> vulnerable, I am using the latest version rkhunter on sme 6.0.1-01.
> The same result is coming up as listed in forum. Do I need to update
> any files or is it as Charlie Brady said reading old numbers that may have been patched.

Have you applied all available updates?

http://no.longer.valid/phpwiki/index.php/How%20to%20update%20SME%20Server

If you haven't, please do.

If you have, please provide the details of the rkhunter output so we analyse them.

Thanks,

Gordon
...

Offline wellsi

  • *
  • 475
  • +0/-0
    • http://www.wellsi.com
Results of rkhunter
« Reply #1 on: November 26, 2005, 10:54:58 PM »
The rkhunter report says that four applications are either old or have been patched.

> - GnuPG 1.0.7 [ Old or patched version ]


You should have gnupg-1.0.7-13 if you applied the updates.
This contains the patch for the latest known vulnerability.

> - Apache 1.3.27 [ Old or patched version ]


You should have apache-1.3.27-8.legacy  if you applied the updates.
This contains the patch for the latest known vulnerability.

> - OpenSSL 0.9.6b [ Old or patched version ]


There is openssl-0.9.6b-39.7.legacy in updates-testing

Additionally, Fedora Legacy has just released a new version of OpenSSL to their testing queue.

openssl-0.9.6b-39.10.legacy is under test and it appears to address the latest vulnerabilities. Once this package is proven it will be made available. If you require it earlier it is in http://www.mirrorservice.org/sites/download.fedoralegacy.org/legacy/redhat/7.3/updates-testing/i386/


> - ProFTPd 1.2.9 [ Old or patched version ]


You should have proftpd-1.2.9-es3 if you have applied the updates
This has been patched against the latest known vulnerability.

So in summary all problems highlighted have fixes upstream and either are, or will be, available as a maintenance update


Please, if there are future questions of this kind, address them to security@contribs.org as all emails will receive a reply from the security team. It also allows us to ensure that the issues raised are tracked until completion.

Ian
............