[lug] openssl vulnerability

D. Stimits stimits at attbi.com
Sun Sep 22 13:24:20 MDT 2002


j davis wrote:
> i added thiese rules for the ssl vuln...this is based on the rules
> posted at snort.org to pick up connections to the uploaded c-code dos 
> client.
> 
> jd
> 
> /sbin/iptables -A INPUT -i eth0 -p udp --dport 2002 -j LOG 
> --log-prefix="SSL VULN:"
> /sbin/iptables -A INPUT -i eth0 -p udp --sport 2002 -j LOG 
> --log-prefix="SSL VULN:"
> /sbin/iptables -A INPUT -i eth0 -p udp --dport 2002 -j DROP
> /sbin/iptables -A INPUT -i eth0 -p udp --sport 2002 -j DROP
> 
> /sbin/iptables -A FORWARD -i eth1 -p udp --dport 2002 -j LOG 
> --log-prefix="SSL VULN:"
> /sbin/iptables -A FORWARD -i eth1 -p udp --sport 2002 -j LOG 
> --log-prefix="SSL VULN:"
> /sbin/iptables -A FORWARD -o eth0 -p udp --dport 2002 -j LOG 
> --log-prefix="SSL VULN OUT:"
> /sbin/iptables -A FORWARD -o eth0 -p udp --sport 2002 -j LOG 
> --log-prefix="SSL VULN OUT:"
> /sbin/iptables -A FORWARD -i eth1 -p udp --dport 2002 -j DROP
> /sbin/iptables -A FORWARD -i eth1 -p udp --sport 2002 -j DROP
> /sbin/iptables -A FORWARD -o eth0 -p udp --dport 2002 -j DROP
> /sbin/iptables -A FORWARD -o eth0 -p udp --sport 2002 -j DROP
> 

I'm curious, why port 2002? Is that something the crackers are known to 
use for backdoor? I wouldn't think source of 2002 would matter either 
way, but there is no telling what a cracker would want to do without see 
ing their actual code.

D. Stimits, stimits AT attbi.com

PS: I should switch to iptables instead of ipchains, if for no other 
reason than the --log-prefix. My system is entirely cut off from 
incoming, other than auth, so I don't see other advantages in iptables 
over ipchains just to block the world out...but good logging is hard to 
beat.

> 
> 
> 
> 
> 
>> From: "D. Stimits" <stimits at attbi.com>
>> Reply-To: lug at lug.boulder.co.us
>> To: BLUG <lug at lug.boulder.co.us>
>> Subject: [lug] openssl vulnerability
>> Date: Sat, 21 Sep 2002 10:06:04 -0600
>>
>> Just thought I'd pass something along that I've seen some notice of 
>> lately. There is a vulnerability in non-upgraded openssl package, 
>> which is not really news. However, there were a couple of interesting 
>> points I found that might be useful. One is that "ELF_SLAPPER.A" seems 
>> to have as its purpose distributed DoS. Second, file ".bugtraq.c" will 
>> be found in /tmp/ if the worm is on the system. Third, it only has the 
>> privileges of the Apache user. Fourth, and the part which might be 
>> most interesting, is that the worm first uses an invalid GET request 
>> on port 80 to determine if this is an Apache machine; then it hits 
>> port 443 to do what it does. If you see logs of someone hitting port 
>> 80 with an erroneous GET request, then port 443 immediately after, 
>> probably you are being tested for attack. Also, I recall seeing 
>> somewhere a claim that disabling SSL2 would solve this, but it seems 
>> that SSL3 has a slightly different means of attacking (all of course 
>> on outdated openssl).






More information about the LUG mailing list