| Ãë¾àÁ¡ID |
24016 |
| À§Çèµµ |
40 |
| Æ÷Æ® |
|
| ÇÁ·ÎÅäÄÝ |
ICMP |
| ºÐ·ù |
BackDoor |
| »ó¼¼¼³¸í |
ÇØ´ç È£½ºÆ®´Â ºÐ»ê ¼ºñ½º°ÅºÎ °ø°ÝÅøÀÎ 'Stacheldraht' agent°¡ °¡µ¿ÁßÀÎ °ÍÀ¸·Î ³ªÅ¸³´Ù. À̰ÍÀº Æ®·ÎÀ̸ñ¸¶ÀÇ ÀÏÁ¾À¸·Î ÇØ´ç ½Ã½ºÅÛÀ» ¿ø°ÝÀ¸·Î Á¦¾îÇÏ¿© ¶Ç´Ù¸¥ ³×Æ®¿öÅ©¸¦ °ø°ÝÇϴµ¥ »ç¿ëµÈ´Ù (À̰ÍÀ» ºÐ»ê ¼ºñ½º°ÅºÎ °ø°Ý ÅøÀ̶ó°í ÇÔ). ¼ºñ½º °ÅºÎ´Â °¢Á¾ ³×Æ®¿öÅ© µ¥ÀÌÅÍ·Î ÆÐŶ floodingÀ» ÀÏÀ¸Å°´Â ¹æ¹ý°ú °°ÀÌ ºÎÇÏÆøÁÖ¸¦ °¡ÇÏ¿© ¿©·¯ ÀÚ¿øÀ» »ç¿ëÇÏÁö ¸øÇÏ°Ô ÇÏ´Â ±â¼úÀÌ´Ù. "Stacheldraht"´Â Trinoo, TFN, ±×¸®°í TFN2K¿Í °°Àº Ãʱ⿡ À̽´ÈµÈ Åø°ú °°Àº ºÎ·ù¿¡ ¼ÓÇÑ´Ù. ±× Åøµé°ú °°ÀÌ "Stacheldraht"´Â master (handler)¿Í daemon, ȤÀº "bcast" (agent) ÇÁ·Î±×·¥µé·Î ±¸¼ºµÈ´Ù. Stacheldraht (°¡½Ãö»ç, "barbed wire"ÀÇ µ¶ÀϾî)´Â TFN°ú "trinoo"ÀÇ Æ¯Â¡µéÀ» ¸ðµÎ °¡Áö°í ÀÖÀ¸¸ç Attacker¿Í stacheldraht masterµé, ±×¸®°í ÀÚµ¿ ¾÷µ¥ÀÌÆ®µÇ´Â agentµé°£¿¡ ¾ÏÈ£ÈµÈ Åë½ÅÀ» ÇÑ´Ù. TrinooÀÇ handler/agent ü°è¿Í ÇÔ²² stacheldraht´Â ICMP flood, SYN flood, UDP flood, and "Smurf" ½ºÅ¸ÀÏÀÇ °ø°Ý ¼ö´ÜÀ¸·Î TFNÀÇ ºÐ»ê ³×Æ®¿öÅ© ¼ºñ½º °ÅºÎ °ø°Ý¹ýµéÀ» °øÀ¯ÇÑ´Ù. ¿ø·¡ÀÇ TFN °ú TFN2K¿Í´Â ´Þ¸®, stacheldraht´Â root shell·Î ¹Ù·Î ¿¬°áµÇ´Â TCP Æ÷Æ®¸¦ »ç¿ëÇÏÁö´Â ¾Ê´Â´Ù. ÇØ´ç È£½ºÆ®´Â ÀÌ¹Ì Attacker¿¡ ÀÇÇØ ħÅõ´çÇÑ °ÍÀ¸·Î ºÁ¾ß ÇÑ´Ù.
* Âü°í »çÀÌÆ®: http://www.iss.net/security_center/static/5279.php http://staff.washington.edu/dittrich/misc/stacheldraht.analysis
* ¿µÇâÀ» ¹Þ´Â Ç÷§Æû: Microsoft Windows Any version |
| ÇØ°áÃ¥ |
¹é¾÷À¸·Î ºÎÅÍ ½Ã½ºÅÛÀ» º¹±¸Çϰí CERT³ª °ü·Ã ±â°ü¿¡ ¿¬¶ôÀ» ÃëÇÏ¿©¾ß ÇÑ´Ù. |
| °ü·Ã URL |
CVE-2000-0138 (CVE) |
| °ü·Ã URL |
(SecurityFocus) |
| °ü·Ã URL |
(ISS) |
|