0day Linux/CentOS SSHd Spam Exploit — libkeyutils.so.1.9 (Warning)

Status
Not open for further replies.

Loonycgb2

Active Member
957
2011
239
0
HOW TO FIND OUT IF YOU HAVE BEEN ROOTED:

Code:
ls -la /lib64/libkeyutils.so.1.9
rpm -qf /lib64/libkeyutils.so.1.9


 ls -la /lib/libkeyutils.so.1.9
rpm -qf /lib/libkeyutils.so.1.9

If you find the file and RPM shows “is not owned by any package” you have been rooted.


http://blog.solidshellsecurity.com/2013/02/18/0day-linuxcentos-sshd-spam-exploit-libkeyutils-so-1-9/


P.S. I have seen original makers comment of this exploit and it is being forced onto the system by perl attacks so please disable compilers and also limit perl to root by chmod or else you will get rooted
 
7 comments
Has anyone here found there box rooted?

I thought this thread would have loads of replies with all the web-hosts around.
 
Very few of them know anything about system administration. They throw up the appropriate newb-friendly panels and start selling hosting, its surprising how few of them understand their own product/service.

Anyhow, seems its a serious(ish) vuln i suppose.
 
Well being that some users are not well equiped with knowledge to keep from being rooted the easiest possible solution to stopping this from happening is creating one of those files on your server and chmod to something that cannot be used by the system account.
 
Status
Not open for further replies.
Back
Top