Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 5 Jul 2011 08:39:41 +0400
From: Solar Designer <>
To: HD Moore <>
Subject: Re: vsftpd download backdoored

On Mon, Jul 04, 2011 at 11:04:00PM -0500, HD Moore wrote:
> This copy is backdoored and has mtime Feb-15-2011. Chris didn't reply
> when I asked him for a copy from his master (old/vsftpd-2.3.4.tar.gz).

So, I tried searching for MD5, SHA-1, and SHA-512 of this - no hits on
Google web search.  Lots of hits for SHA-256, indeed - due to the
incident announcement.

Thus, chances are that no distro is affected.

More info on what's inside the tarball: user/group "user" (either the
intruder's username on his/her computer or --owner and --group options
argument to tar), "GCC: (Ubuntu/Linaro 4.5.2-8ubuntu4) 4.5.2" inside the
.o files.  This suggests Ubuntu 11.04, right?

BTW, what if the .o files _don't_ match the source code? ;-)  I think
they might be used when one builds vsftpd from this tarball, which means
that the build (or run) will fail on some older systems (yet another
reason why this would be noticed quickly), but also that the actual
backdoor might be different (and more sophisticated) from what we see in
the source code.  No, I don't think this is the case, but the
possibility is there, and I find it curious.

A trivial way to check for this would be to try compiling the source
code on Ubuntu 11.04 and see if the .o files match.  If not, the
differences will need to be analyzed manually.  Not that anyone cares...


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.