VSFTPD’nin vsftpd-2.3.4 Versiyonunda Backdoor Tespit Edildi
Alert: vsftpd download backdoored
[With thanks to Mathias Kresin for being the first to notice]
An incident, what fun! Earlier today, I was alerted that a vsftpd download from the master site (vsftpd-2.3.4.tar.gz) appeared to contain a backdoor:
The bad tarball is (sha256sum):
2a4bb16562e0d594c37b4dd3b426cb012aa8457151d4718a5abd226cef9be3a5 vsftpd-2.3.4.tar.gz
And, of course, the GPG signature notices:
$ gpg ./vsftpd-2.3.4.tar.gz.asc
gpg: Signature made Tue 15 Feb 2011 02:38:11 PM PST using DSA key ID 3C0E751C
gpg: BAD signature from "Chris Evans <chris@scary.beasts.org>"
Check your signatures 🙂
Ideally, you’ll see something like:
gpg: Signature made Tue 15 Feb 2011 02:38:11 PM PST using DSA key ID 3C0E751C
gpg: Good signature from "Chris Evans <chris@scary.beasts.org>"
Primary key fingerprint: 8660 FD32 91B1 84CD BC2F 6418 AA62 EC46 3C0E 751C
Signatures aside, I also took the liberty of moving most of the vsftpd site and latest download to a hosting provider I have more faith in:
https://security.appspot.com/vsftpd.html
https://security.appspot.com/downloads/vsftpd-2.3.4.tar.gz
https://security.appspot.com/downloads/vsftpd-2.3.4.tar.gz.asc
The backdoor payload is interesting. In response to a 🙂 smiley face in the FTP username, a TCP callback shell is attempted. There is no obfuscation. More interestingly, there’s no attempt to broadcast any notification of installation of the bad package. So it’s unclear how victims would be identified; and also pretty much guaranteed that any major redistributor would notice the badness. Therefore, perhaps someone was just having some lulz instead of seriously trying to cause trouble.
POST YOUR COMMENTS
You must be logged in to post a comment.