Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Unix :: General :: ciace014.txt

Wuarchive FTPd Trojan




             _____________________________________________________
                         The U.S. Department of Energy
                     Computer Incident Advisory Capability
                             ___  __ __    _     ___
                            /       |     / \   /
                            \___  __|__  /___\  \___
             _____________________________________________________

			       Advisory Notice

			 wuarchive ftpd Trojan Horse

April 6, 1994 1640 PST                                            Number E-14
______________________________________________________________________________
PROBLEM:  Some copies of wuarchive FTP daemon (ftpd) source have been modified
          and contain a Trojan horse.
PLATFORM: UNIX machines running wuarchive ftpd version 2.2 or earlier.
DAMAGE:   Root access may be obtained.
SOLUTION: Disable the wuarchive ftpd, then retrieve and install wuarchive ftpd
          version 2.3 
ASSESSMENT OF VULNERABILITY: Intruders have used this Trojan horse to obtain
          root access to computers on the Internet.
______________________________________________________________________________

	    Critical Information about wuarchive ftpd Trojan Horse

CIAC has received information that some copies of of the wuarchive FTP daemon
(ftpd) versions 2.2 and 2.1f have been modified at the source code level to
contain a Trojan horse.  This Trojan allows any user, local or remote, to
become root on the affected UNIX system.

CIAC strongly recommends that all sites running these or older versions of the
wuarchive ftpd retrieve and install version 2.3.  It is possible that versions
previous to 2.2 and 2.1f contain the Trojan as well.

If the new version cannot be installed in a timely manner, all FTP service
should be disabled, since this Trojan affects all systems that are running the
wuarchive ftpd, whether or not the system provides anonymous ftp service.

Sites can obtain version 2.3 via anonymous FTP from ftp.uu.net, in the file
/networking/ftp.wuarchive-ftpd/wu-ftpd-2.3.tar.Z.  The BSD Checksum for this
file is 24416 181, the SVR4 Checksum for this file is 30488 361, and the MD5
Digital Signature is e58adc5ce0b6eae34f3f2389e9dc9197.

______________________________________________________________________________

For additional information or assistance, please contact CIAC:
    Voice:   510-422-8193
    FAX:     510-423-8002
    STU-III: 510-423-2604
    E-mail:  ciac@llnl.gov

Previous CIAC Bulletins and other information are available via anonymous FTP
from irbis.llnl.gov (IP address 128.115.19.60).
______________________________________________________________________________

CIAC has two self-subscribing mailing lists for its two types of electronic
publications: 1. Advisories (highest priority, time critical information) or
Bulletins (important computer security information) and 2. Notes (computer
security articles of general interest).  Our mailing lists are managed by a
public domain software package called ListProcessor, which ignores E-mail
header subject lines.  To subscribe (add yourself) to one of our mailing lists,
send E-mail to: ciac-listproc@llnl.gov with the following request as the E-mail
message body, substituting CIAC-BULLETIN or CIAC-NOTES for (service) and valid
information for the other items in parentheses:

        subscribe  (service)  (Full_Name)  (Phone_number)

You will receive an acknowledgment containing address, initial PIN, and
information on how to change either of them, cancel your subscription, or get
help.  Currently, to subscribe to both you must send two separate requests.  

To subscribe an address which is a distribution list, first subscribe the
person responsible for your distribution list.  You will receive an
acknowledgment, containing address and initial PIN.  Change the address to the
distribution list by sending a second E-mail request.  As the body of this
message, send the following request, substituting valid information for items
in parenthesis:

        set  (service)  address  (PIN)  (distribution_list_address)
______________________________________________________________________________

CIAC wishes to acknowledge and thank the contribution of the CERT Coordination
Center for their timely advisory on this vulnerability.
______________________________________________________________________________

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins.  If you are not part of these communities, please
contact your agency's response team to report incidents.  Your agency's team
will coordinate with CIAC.  The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization.  A list of FIRST member organizations
and their constituencies can be obtained by sending E-mail to
first-request@first.org with an empty subject line and a message body
containing the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of the
United States Government.  Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for the
accuracy, completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately owned
rights.  Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring by
the United States Government or the University of California.  The views and
opinions of authors expressed herein do not necessarily state or reflect those
of the United States Government nor the University of California, and shall not
be used for advertising or product endorsement purposes.
______________________________________________________________________________



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH