Home > Threat descriptions >

Linux/Kork

Classification

Category: Malware

Type: Worm

Platform: Linux

Aliases: Kork, Linux/Kork, Unix/Kork, Worm.Linux.Kork

Summary


Kork is a worm that uses the known vulnerability in lpd service to propagate from a vulnerable Linux system to another. This service is part of the default installation of Red Hat Linux 7.0.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details



Variant:Kork.A

If the worm finds a vulnerable host, it first creates two users, "kork" and "kork2", to the system without a password. "kork2" user has a root priviledge.

Kork also adds an open shell to port 666.

Next it attempts to download a trojanized login and the main part of the trojan from a web site. Since April 26th, 2001, neither of these files are available, so the worm cannot replicate any further. However, already infected machines are able to compromise other vulnerable machines by adding an open shell and users to the system.

If the download is completed, the worm installs trojanized "/bin/login" and "/bin/ps" to the system. It attemps to send sensitive system data propably to the virus writer.

Original "/bin/ps" is copied to "/usr/bin/.ps" and the original "/bin/login" is copied to "/bin/.login".

Finally the worm starts to scan random Class-B subnets for vulnerable hosts.

The vulnerability in the lpd daemon is known and already fixed within updated provided by Red Hat at: https://www.redhat.com/support/errata/rh7-errata-security.html

Date Created: -

Date Last Modified: -