Re: Apache hacks (./atac, d0s.txt)

From: Jay D. Dyson (
Date: 04/29/05

  • Next message: Steve Kemp: "Re: Apache hacks (./atac, d0s.txt)"
    Date: Fri, 29 Apr 2005 14:49:42 -0700 (PDT)
    To: Bugtraq <>

    Hash: SHA1

    On Fri, 29 Apr 2005, Andrew Y Ng wrote:

    > My server has been seeing some usual activities today, I don't have much
    > time to get down to the bottom of things, but after I investigated
    > briefly I have decided to disable PERL executable permission for
    > www-data (Apache process's user), also locked /var/tmp so www-data
    > cannot write to it.
    > Looks like it ignores all the `kill` signals, not sure how I can
    > actually kill it...

             Seems a bit premature to call this an "Apache hack." First off,
    it's probably not Apache's fault. Judging from what I've seen thus far,
    it looks more like a flaw in one of your CGI scripts which allowed someone
    to create and execute an arbitrary file in one of the system's most
    obvious world-writable directories.

             From what I've seen, the script looks like a vanilla, PERL-based
    IRC bot. You should be able to kill -9 it via root.

             Either way, your system got molested. Take the box offline, back
    up your data, audit your CGI scripts and access policies for flaws and
    weaknesses, scrub the system, reinstall the OS from trusted media, apply
    all the latest patches, bring the box back online, and have a nice day.

    - -Jay

        ( ( _______
        )) )) .-"There's always time for a good cup of coffee"-. >====<--.
      C|~~|C|~~| \----- Jay D. Dyson -- -----/ | = |-'
       `--' `--' `-- Pardon me, but am I on the right planet? --' `------'

    Version: GnuPG v1.4.1 (TreacherOS)
    Comment: See for current keys.

    -----END PGP SIGNATURE-----

  • Next message: Steve Kemp: "Re: Apache hacks (./atac, d0s.txt)"