Plugin ID | 283 |
Plugin name | Trinity v3 detection |
Plugin filename | Trinity v3 detection.plugin |
Plugin filesize | 2237 bytes |
Plugin family | Backdoors |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/02 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 33270 |
Plugin procedure detection | open|send !@#\n|sleep|send id\n|sleep|close|pattern_exists uid |
Plugin detection accuracy | 90 |
Plugin comment | The NASL script is Copyright (C) 2000 Renaud Deraison |
Bug affected | Trinity v3 |
Bug not affected | Other solutions and not compromised systems |
Bug vulnerability class | Configuration |
Bug description | The remote host appears to be running Trinity v3, which is a trojan that can be used to control your system or make it attack another network (this is actually called a distributed denial of service attack tool). It is very likely that this host has been compromised. |
Bug solution | Restore your system from backups, contact CERT and your local authorities. |
Bug fixing time | Approx. 2 days |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 8 |
Bug simplicity | 3 |
Bug impact | 9 |
Bug risk | 7 |
Bug Nessus risk | Critical |
Bug check tools | Nessus can check this flaw with the plugin 10501 (Trinity v3 Detect). |
Source CVE | CAN-2000-0138 |
Source Nessus ID | 10501 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |