The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Remotely replaced sshd_config, CentOS 5.3/SSH 4.3p2-36el5_4.2

Discussion in 'Security' started by OffbeatAdam, Nov 12, 2009.

  1. OffbeatAdam

    OffbeatAdam Active Member

    Joined:
    Jan 24, 2006
    Messages:
    31
    Likes Received:
    0
    Trophy Points:
    6
    Location:
    San Antonio, TX
    Hello Everyone,

    Fighting a bit of a nasty morning... anyone seen this before?

    We have a number of servers that have password authentication disabled as well as shell access disabled for all users except those whom have keys. These servers run cPanel and have been updated to the following specs:

    2.6.18-164.el5PAE #1 SMP Thu Sep 3 04:10:44 EDT 2009 i686 i686 i386 GNU/Linux
    openssh-4.3p2-36.el5_4.2

    Early (around midnight-1am CST) this morning we had a widespread attack via an unknown vector. In the attack, the only thing that I can find is the following (IP blacked out, although it is the attackers' address):

    Nov 12 04:31:22 sharedserver/sharedserver sshd[16083]: Received disconnect from 100.100.100.100: 11: No supported authentication methods available
    Nov 12 04:32:14 sharedserver/sharedserver sshd[11265]: Received signal 15; terminating.
    Nov 12 04:32:14 sharedserver/sharedserver sshd[16570]: Server listening on :: port 2.
    Nov 12 04:32:14 sharedserver/sharedserver sshd[16570]: error: Bind to port 2 on 0.0.0.0 failed: Address already in use.
    Nov 12 04:32:27 sharedserver/sharedserver sshd[16611]: Accepted password for root from 100.100.100.100 port 3630 ssh2
    Nov 12 04:32:27 sharedserver/sharedserver sshd[16611]: pam_unix(sshd:session): session opened for user root by (uid=0)


    The concerning part is that it obviously appears that there is someone reloading SSHD, but there is no successful login (at all) via shell prior to this.

    This time corresponds with a modified sshd_config that then allows password authentication, whereby the user then logs in as root and has a good time, so to speak.

    I know that the following vulnerability is out in the wild:

    Linux Kernel 'sock_sendpage()' NULL Pointer Dereference Vulnerability

    However, since the user never actually logged into the server from what I can see, I'm still searching for the real way that this occurred.

    I have logs from these servers, if you need other information to possibly help track this down that is possible. I'm having a hard time finding the vector for this attack though...

    Any assistance would be greatly appreciated.
     
  2. Spiral

    Spiral BANNED

    Joined:
    Jun 24, 2005
    Messages:
    2,023
    Likes Received:
    7
    Trophy Points:
    0
    Without more information, the first thing I would check is /var/log/yum.log and look for recent 'ssh' or 'openssh' entries to make sure you didn't simply get an incoming system update.

    Next, I'd take a bit closer look at both "secure" and "messages" and also the Apache access log files around the same period as what you quoted.

    Irregardless as to whether the above turns up any additional information, it would be wise to do a complete and thorough security analysis to make sure you don't have any exploitable holes still open or compromises already made which you might not be aware.

    Now regarding Certificates or Password Authentication, that is not nearly as important as the above as using Password Authentication with a sufficiently long and completely randomized password is statistically about as secure as using certificates and there is little additional advantage either way though it usually won't hurt unless someone
    or something comes and blows away your certificates but the same
    could be said for the passwords as well.

    Regarding your kernel you are a little behind on updates for CentOS or Redhat but not severely unless you are talking about manually compiled kernels which do go substantially further. For standard release, the current latest is 2.6.18-164.6.1 and you are only running 2.6.18-164 so
    a kernel update might also be in order here.

    If you need any assistance, please let know as this is in fact my particular area of expertise specifically. (server / network security)
     
  3. BianchiDude

    BianchiDude Well-Known Member
    PartnerNOC

    Joined:
    Jul 2, 2005
    Messages:
    619
    Likes Received:
    0
    Trophy Points:
    16
  4. BareckObama

    BareckObama Active Member

    Joined:
    Jun 5, 2009
    Messages:
    32
    Likes Received:
    0
    Trophy Points:
    6
    Location:
    In the heart of obama.
    Is it cpanel chkservd restarting it? However the ip 100.100.100.100 is strange.
     
  5. WebHostDog

    WebHostDog Well-Known Member

    Joined:
    Sep 3, 2006
    Messages:
    144
    Likes Received:
    0
    Trophy Points:
    16
    cPanel Access Level:
    Website Owner
    Upgrade your kernel. It is vulnerable.
     
Loading...
Similar Threads - Remotely replaced sshd_config
  1. bear
    Replies:
    14
    Views:
    2,946

Share This Page