Brief description: When an attacker has compromised a system, she will often install a backdoor that surreptitiously listens on a port, and allows the attacker to regain access to the system at a later time.
Full description: A backdoor is a program that is not obviously in place, but allows an attacker to obtained unauthorized privileges. Often, when an attacker has successed in compromising a system, a backdoor will be installed that listens on the network so that the attacker may regain remote access at a later time. The attacker will sometimes patch the hole that originally allowed access, and the attacker would then like to be able to return without having to alter existing system accounts or passwords. The backdoor allows this. Port 1524 is commonly used for such a backdoor.
Components: TCP/IP stack
Systems: Any that support network connectivity.
Effect(s) of exploiting: The effect depends on the nature of the server being run.
Detecting the hole:
Fixing the hole:
Other information:
backdoor network
CVE Number: ##### --
Attack:
Advisories:
Related Vulnerabilities:
Reporting: in ( )