Re: New Linux Trojan

From: Gary Flynn (flynngnat_private)
Date: Thu Sep 06 2001 - 07:43:32 PDT

  • Next message: Russell Fulton: "Re: Code red variants?"

    Ben Ford wrote:
    > 
    > Qualys Inc wrote:
    > >
    > >Mitigating Factors:
    > >-------------------
    > >The replication process of the Remote Shell Program can only effect
    > >binary files within the access privileges of the user who launched
    > >the originally infected program.
    > 
    > A properly configured machine won't have
                 ^^^^^^^^^^
    
    Should be "operated" :)
    
    > the root user running untrusted binaries.
    
    Also, if the machine is used as a development platform, it is likely
    the operator running as a non-privileged user may have write
    access to executables stored in the current working directory which
    would allow the malicious code to spread...perhaps to development
    team members and finally to shared production code. Ugh.
    
    -- 
    Gary Flynn
    Security Engineer - Technical Services
    James Madison University
    
    Please R.U.N.S.A.F.E.
    http://www.jmu.edu/computing/runsafe
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Thu Sep 06 2001 - 11:14:35 PDT