-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

       ESB-2003.0837 -- GENTOO LINUX SECURITY ANNOUNCEMENT 200312-01
               rsync.gentoo.org rotation server compromised
                             05 December 2003

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                gentoo.org rotation server
Publisher:              Gentoo
Operating System:       Linux
Impact:                 Reduced Security

- --------------------------BEGIN INCLUDED TEXT--------------------

- - ---------------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200312-01
- - ---------------------------------------------------------------------------

GLSA:        200312-01
summary:     rsync.gentoo.org rotation server compromised
severity:    normal
date:        2003-12-02
CVE:         None
exploit:     remote

DESCRIPTION:

On December 2nd at approximately 03:45 UTC, one of the servers that makes up
the rsync.gentoo.org rotation was compromised via a remote exploit.  At this
point, we are still performing forensic analysis.  However, the compromised
system had both an IDS and a file integrity checker installed and we have a
very detailed forensic trail of what happened once the box was breached, so
weare reasonably confident that the portage tree stored on that box
wasunaffected.  

The attacker appears to have installed a rootkit and modified/deleted some
files to cover their tracks, but left the server otherwise untouched. The box
was in a compromised state for approximately one hour before it was
discovered and shut down. During this time, approximately 20 users
synchronized against the portage mirror stored on this box. The method used
to gain access to the box remotely is still under investigation.  We will
release more details once we have ascertained the cause of the remote
exploit.  

This box is not an official Gentoo infrastructure box and is instead donated
by a sponsor. The box provides other services as well and the sponsor has
requested that we not publicly identify the box at this time. Because the
Gentoo part of this box appears to be unaffected by this exploit, we are
currently honoring the sponsor's request.  That said, if at any point, we
determine that any file in the portage tree was modified in any way, we will
release full details about the compromised server.  

SOLUTION:

Again, based on the forensic analysis done so far, we are reasonably
confident that no files within the Portage tree on the box were affected.
However, the server has been removed from all rsync.*.gentoo.org rotations
and will remain so until the forensic analysis has been completed and the box
has been wiped and rebuilt. Thus, users preferring an extra level of security
may ensure that they have a correct and accurate portage tree by running:

emerge sync

Which will perform a sync against another server and ensure that all files
are up to date.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBP8/TgCh9+71yA2DNAQFPEwP+KvauDO72hhv38cAXf9quL+FjKfX09LqD
Nl1jE99yfMV59X3Wu/FZEpdYmcay0r7guGjeOGxIYS4Ze5cQDEPE/zoKUWr8uP3r
FmImH5r7LA6ueWIhl/S51DPEgXyrs27oPZskv2CC9QSTelcGCbDfMAofoHgXJJGr
0KDzSAVnNSc=
=Ux2T
-----END PGP SIGNATURE-----