Subject: wuarchive ftpd Trojan
To: None <current-users@sun-lamp.cs.berkeley.edu>
From: Michael Graff <explorer@iastate.edu>
List: current-users
Date: 04/06/1994 16:28:37
Just so you folk using wuarchive's super ftpd know about this...
------- Forwarded Message
Subject: Re: wuarchive ftpd Trojan
Newsgroups: alt.security,comp.security.misc,comp.security.unix,comp.unix.admin
In-Reply-To: <2nutuq$q5d@anshar.shadow.net>
Organization: Iowa State University, Ames, Iowa (USA)
In article <2nutuq$q5d@anshar.shadow.net> you write:
}
}Well, finally has happened again. a major program has been trojaned.
}
}CERT advisory as always lacks any concrete information about it
}other than to say, you need to get the newest version.
}
}It might be more useful to say what the trojan was. or how
}it was implemented because How do I know some intruder stick
}his trojan into the newest version of wu-ftp and sendmail as well?
}
}Id like to point out that 8lgm (Karl Strickland and Neil Woods)
}were contributors to the fact that CERT released this advisory.
}
}
}
}
}
}From cert-advisory-request@cert.org Wed Apr 6 13:37:03 1994
}Received: from cert.org (cert.org [192.88.209.5]) by shadow.net (8.6.8.1/jc-1.0) with SMTP id NAA26148 for <cklaus@shadow.net>; Wed, 6 Apr 1994 13:37:02 -0400
}Received: from clorets.cert.org by cert.org (4.1/cert-5.2)
} id AA00802; Wed, 6 Apr 94 13:21:26 EDT
}Received: by clorets.cert.org (5.65/2.5)
} id AA02450; Wed, 6 Apr 94 12:54:39 -0400
}Message-Id: <9404061654.AA02450@clorets.cert.org>
}From: CERT Advisory <cert-advisory-request@cert.org>
}Date: Wed, 6 Apr 94 12:51:16 EDT
}To: cert-advisory@cert.org
}Subject: CERT Advisory - wuarchive ftpd Trojan Horse
}Organization: Computer Emergency Response Team : 412-268-7090
}Status: OR
}
}=============================================================================
}CA-94:07 CERT Advisory
} April 6, 1994
} wuarchive ftpd Trojan Horse
}-----------------------------------------------------------------------------
}
}The CERT Coordination Center has received confirmation that some copies
}of the source code for the wuarchive FTP daemon (ftpd) were modified by
}an intruder, and contain a Trojan horse.
}
}We strongly recommend that any site running the wuarchive ftpd take steps
}to immediately install version 2.3, or disable their FTP daemon.
}
}-----------------------------------------------------------------------------
}
}I. Description
}
} Some copies of the source code for versions 2.2 and 2.1f of the
} wuarchive ftpd were modified by an intruder, and contain a Trojan
} horse. If your FTP daemon was compiled from the intruder-modified
} source code, you are vulnerable.
}
} It is possible that previous versions of the source code for the server
} were modified in a similar manner.
}
} If you are running the wuarchive ftpd, but not providing anonymous FTP
} access, you are still vulnerable to this Trojan horse.
}
}
}II. Impact
}
} An intruder can gain root access on a host running an FTP daemon
} that contains this Trojan horse.
}
}
}III. Solution
}
} We strongly recommend that any site running the wuarchive ftpd (version
} 2.2 or earlier) take steps to immediately install version 2.3.
}
} If you cannot install the new version in a timely manner, you should
} disable FTP service. It is not sufficient to disable anonymous FTP.
} You must disable the FTP daemon.
}
} Sites can obtain version 2.3 via anonymous FTP from ftp.uu.net, in the
} "/networking/ftp/wuarchive-ftpd" directory. We recommend that you turn
} off your FTP server until you have installed the new version.
}
} Be certain to verify the checksum information to confirm that you have
} retrieved a valid copy.
}
} BSD SVR4
} File Checksum Checksum MD5 Digital Signature
} ----------------- -------- --------- --------------------------------
} wu-ftpd-2.3.tar.Z 24416 181 30488 361 e58adc5ce0b6eae34f3f2389e9dc9197
}
}
}---------------------------------------------------------------------------
}The CERT Coordination Center wishes to thank Bryan O'Connor and Chris Myers
}of Washington University in St. Louis for their invaluable assistance in
}resolving this problem. CERT also gratefully acknowledges the help of
}Neil Woods and Karl Strickland.
}---------------------------------------------------------------------------
}
}If you believe that your system has been compromised, contact the CERT
}Coordination Center or your representative in the Forum of Incident
}Response and Security Teams (FIRST).
}
}If you wish to send sensitive incident or vulnerability information to
}CERT via electronic mail, CERT strongly advises that the e-mail be encrypted.
}CERT can support a shared DES key, PGP (public key available via
}anonymous FTP on info.cert.org), or PEM (contact CERT for details).
}
}Internet E-mail: cert@cert.org
}Telephone: 412-268-7090 (24-hour hotline)
} CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4),
} and are on call for emergencies during other hours.
}
}CERT Coordination Center
}Software Engineering Institute
}Carnegie Mellon University
}Pittsburgh, PA 15213-3890
}
}Past advisories, information about FIRST representatives, and other
}information related to computer security are available via anonymous
}FTP from info.cert.org.
}
}
}--
}Christopher William Klaus Email: cklaus@shadow.net Author:Inet Sec. Scanner
}2209 Summit Place Drive,Dunwoody, GA 30350-2430. (404)998-5871.
------- End of Forwarded Message
------------------------------------------------------------------------------