Eric Pretorious
Regular Pleskian
While searching for the Linux/CDorked.A exploit, I discovered that the suexec binary has been modified:http://www.welivesecurity.com/2013/05/07/linuxcdorked-malware-lighttpd-and-nginx-web-servers-also-affected/ said:The backdoor leaves no traces of compromised hosts on the hard drive other than its modified httpd binary, thereby complicating forensics analysis... We also recommend using... `rpm –verify` for RPM based systems, to verify the integrity of your Apache web server package installation.
Code:
[root@www httpd]# rpm -V httpd
S.5....T. c /etc/httpd/conf/httpd.conf
S.5....T. /usr/sbin/suexec
[root@www httpd]# for x in `rpm -ql httpd | grep sbin` ; do ls -al $x ; done
-rwxr-xr-x 1 root root 3916 Feb 22 11:19 /usr/sbin/apachectl
-rwxr-xr-x 1 root root 19984 Feb 22 11:21 /usr/sbin/htcacheclean
-rwxr-xr-x 1 root root 354816 Feb 22 11:21 /usr/sbin/httpd
-rwxr-xr-x 1 root root 368168 Feb 22 11:21 /usr/sbin/httpd.event
-rwxr-xr-x 1 root root 367240 Feb 22 11:21 /usr/sbin/httpd.worker
-rwxr-xr-x 1 root root 11192 Feb 22 11:21 /usr/sbin/httxt2dbm
-rwxr-xr-x 1 root root 16744 Feb 22 11:21 /usr/sbin/rotatelogs
-r-s--x--- 1 root apache 24128 May 3 04:00 /usr/sbin/suexec