Angeblich offene ports bei Debain Woody

Bernhard Sadlowski sadlowsk at Mathematik.Uni-Bielefeld.DE
Mon Mar 4 19:56:07 CET 2002


Hi Achim,

On 04 Mar 2002 19:21, Achim Dreyer <adreyer at math.uni-paderborn.de> wrote:
> > 67/udp (bootps) ist laut netstat oder lsof nicht offen.
> .. schon in (x)inetd.conf geschaut ? Evtl. nur offen wenn anfrage an port
> da..

Standard Debian Woody:

# grep -v "^#" /etc/inetd.conf  | sort | uniq

daytime         stream  tcp     nowait  root    internal
discard         dgram   udp     wait    root    internal
discard         stream  tcp     nowait  root    internal
smtp            stream  tcp     nowait  mail    /usr/sbin/exim exim -bs
time            stream  tcp     nowait  root    internal

# ps ax | egrep 'boot|ftp|dhcp'
16006 pts/0    S      0:00 egrep boot|ftp|dhcp

> > Ebenfalls sehe ich durch den scan die gleichen angeblich offenen ports auf
> > Suse Linux 7.1 mit Kernel 2.2.19. Also scheint das vor allem Kernels 2.2.x
> > zu betreffen. Bei Kernel 2.4.17 wird aber auch noch Port 67/udp gemeldet!
> 
> .. kernel mit bootp-Unterstützung gebaut ?

Standard Debian Woody Kernel... gibt es da eine Kernelunterstützung? Ich
dachte da muss ein bootpd oder so laufen, genauso auch für tftp.
 
> > 2) Sicherheitsfeature der Linux Kernels die auf diesen Ports Trojaner
> > vortäuschen?
> 
> ;-))
> 
> > 3) Bug in den Linux Kernels?
> 
> => Features !!

Mag sein. Ich habe die URL dazu oder die Mail von linux-kernel nicht nicht
gefunden! :-)
 
> > Port       State       Service
> > 53/udp     open        domain
> 
> .. warum hast du den offen ? Ist die Maschine denn DNS-Server ? Du hast
> was von Arbeitsstation geschrieben..

Na das ist meine Firewall zuhause die auch bind laufen hat. Wenn der Port zu
ist, dann gehen keine DNS auflösungen über den named. Offenbar braucht named
den offenenport um Antworten zu bekommen auf externe anfragen??!!

> > 67/udp     open        bootps
> > 10498/udp  open        unknown
> > 18753/udp  open        unknown
> > 27444/udp  open        Trinoo_Bcast
> > 34555/udp  open        unknown
> 
> .. was sind denn das für hohe ports ?

Ja gute Frage. Deswegen die Mail. In irgendwelchen FAQs steht es seinen
ports, die von Linux/Solaris rootkits/Würmern benutzt werden. Nessus sagt
dazu:

---------- 8< -------------------------------------------------------------
 . Vulnerability found on port unknown (34555/udp) :



    The remote host appears to be running
    Trin00 for windows, which is a trojan that can be
    used to control your system or make it
    attack another network (this is
    actually called a distributed denial
    of service attack tool)

    It is very likely that this host
    has been compromised

    Solution : Restore your system from backups,
           contact CERT and your local
           authorities

    Risk factor : Critical
    CVE : CAN-2000-0138

 . Vulnerability found on port unknown (27444/udp) :



    The remote host appears to be running
    Trin00, which is a trojan that can be
    used to control your system or make it
    attack another network (this is
    actually called a distributed denial
    of service attack tool)

    It is very likely that this host
    has been compromised

    Solution : Restore your system from backups,
           contact CERT and your local
           authorities

    Risk factor : Critical
    CVE : CAN-2000-0138

 . Vulnerability found on port unknown (18753/udp) :



    The remote host appears to be running
    Shaft, which is a trojan that can be
    used to control your system or make it
    attack another network (this is
    actually called a distributed denial
    of service attack tool)

    It is very likely that this host
    has been compromised

    Solution : Restore your system from backups,
           contact CERT and your local
           authorities

    Risk factor : Critical
    CVE : CAN-2000-0138

 . Vulnerability found on port unknown (10498/tcp) :



    The remote host appears to be running
    a mstream agent, which is a trojan that can be
    used to control your system or make it
    attack another network (this is
    actually called a distributed denial
    of service attack tool)

    It is very likely that this host
    has been compromised

    Solution : Restore your system from backups,
           contact CERT and your local
           authorities

    Risk factor : Critical
    CVE : CAN-2000-0138


 . Information found on port bootps (67/udp)


    Here is the information we could gather from the remote DHCP
    server. This allows an attacker on your local network to gain
    information about it easily :

    Master DHCP server of this network : 10.59.52.232
    IP address the DHCP server would attribute us : 15.75.206.84
    time server(s) =


    Solution : remove the options that are not in use in your DHCP server
    Risk factor : Low

---------- 8< -------------------------------------------------------------

Das Problem ist: Es ist ja nicht nur mein Router zuhause... offenbar zeigen
alle Linuxe (Debian, Suse, Redhat) die ich so sehe das gleiche Verhalten.

Bernhard




More information about the Linux mailing list