[lug] openssl vulnerability
j davis
davis_compz at hotmail.com
Sun Sep 22 09:50:58 MDT 2002
i added thiese rules for the ssl vuln...this is based on the rules
posted at snort.org to pick up connections to the uploaded c-code dos
client.
jd
/sbin/iptables -A INPUT -i eth0 -p udp --dport 2002 -j LOG --log-prefix="SSL
VULN:"
/sbin/iptables -A INPUT -i eth0 -p udp --sport 2002 -j LOG --log-prefix="SSL
VULN:"
/sbin/iptables -A INPUT -i eth0 -p udp --dport 2002 -j DROP
/sbin/iptables -A INPUT -i eth0 -p udp --sport 2002 -j DROP
/sbin/iptables -A FORWARD -i eth1 -p udp --dport 2002 -j LOG
--log-prefix="SSL VULN:"
/sbin/iptables -A FORWARD -i eth1 -p udp --sport 2002 -j LOG
--log-prefix="SSL VULN:"
/sbin/iptables -A FORWARD -o eth0 -p udp --dport 2002 -j LOG
--log-prefix="SSL VULN OUT:"
/sbin/iptables -A FORWARD -o eth0 -p udp --sport 2002 -j LOG
--log-prefix="SSL VULN OUT:"
/sbin/iptables -A FORWARD -i eth1 -p udp --dport 2002 -j DROP
/sbin/iptables -A FORWARD -i eth1 -p udp --sport 2002 -j DROP
/sbin/iptables -A FORWARD -o eth0 -p udp --dport 2002 -j DROP
/sbin/iptables -A FORWARD -o eth0 -p udp --sport 2002 -j DROP
>From: "D. Stimits" <stimits at attbi.com>
>Reply-To: lug at lug.boulder.co.us
>To: BLUG <lug at lug.boulder.co.us>
>Subject: [lug] openssl vulnerability
>Date: Sat, 21 Sep 2002 10:06:04 -0600
>
>Just thought I'd pass something along that I've seen some notice of lately.
>There is a vulnerability in non-upgraded openssl package, which is not
>really news. However, there were a couple of interesting points I found
>that might be useful. One is that "ELF_SLAPPER.A" seems to have as its
>purpose distributed DoS. Second, file ".bugtraq.c" will be found in /tmp/
>if the worm is on the system. Third, it only has the privileges of the
>Apache user. Fourth, and the part which might be most interesting, is that
>the worm first uses an invalid GET request on port 80 to determine if this
>is an Apache machine; then it hits port 443 to do what it does. If you see
>logs of someone hitting port 80 with an erroneous GET request, then port
>443 immediately after, probably you are being tested for attack. Also, I
>recall seeing somewhere a claim that disabling SSL2 would solve this, but
>it seems that SSL3 has a slightly different means of attacking (all of
>course on outdated openssl).
>
>D. Stimits, stimits AT attbi.com
>
>_______________________________________________
>Web Page: http://lug.boulder.co.us
>Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
>Join us on IRC: lug.boulder.co.us port=6667 channel=#colug
thanks,
jd
jd at taproot.bz | "MORE INPUT!" |
http://www.taproot.bz | Johnny 5 |
-Dope smokers make the net go round-
Me (early 96 while gigglie from
ratstafarian blend)
_________________________________________________________________
MSN Photos is the easiest way to share and print your photos:
http://photos.msn.com/support/worldwide.aspx
More information about the LUG
mailing list