Brief description: a back door to give access to the system without proper authorization
Full description: Once installed, Back Orifice listens at a port. The attacker connects and supplies a BO password. The BO program then allows the attacker to control any function on that remote system. Example commands are to list files, run commands, share directories, kill processes, change the registry, and so forth. The attacker can use either a GUI or a text-based client to control the remote Back Orifice server.
Components: none
Systems: Windows 95, Windows 98 (server and client); variants of the UNIX operating system (client)
Effect(s) of exploiting: Once Back Orifice is installed, attackers have complete access.
Detecting the hole:
Fixing the hole:
Other information:
To determine the password, and port information, for BO given the
executable, use a text editor to view the executable. If the last
line of the file is
"88$8(8,8084888<8@8D8H8L8P8T8X8\8'8d8h8l8'
,
then the server is using the default configuration (port 31377).
Otherwise, the configuration will be the last several lines of this
file, in this order: filename, service description,$port number,
password, optional plugin information.
All communications between backdoor client and the server use UDP. All data sent between the client and server is encrypted. BO generate a 2 byte hash from the password, and uses that hash as the encryption key. The first 8 bytes of all client request packets are
*!*QWTY?
. So, just try all 65,535 possible hashes. Given the
correct hash, one can then generate random passwords until a password
that produces the desired hash is found. At this point, you have
the hash for thast installation of BO. (ISS's X-Force reports doing
this in a few seconds on a Pentium 133 system.)
backdoor, Trojan horse, server
PA Classification(s):
RISOS Classification(s):
DCS Classification(s): not classified yet
CVE Number: CAN-1999-0660 -- A hacker utility or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc.
Attack:
Advisories: Symantec's web advisory on Back Orifice and NetBus
Related Vulnerabilities: none yet
Reporting: Announced by Cult of the Dead Cow (Thu. Aug. 06, 1998 11:04:26)
Other information: Analysis adapted from ISS X-force posting on www.securityfocus.com