I'm helping with a Solaris 8 box that was rooted. The attacker replaced the /usr/bin/mc680*0 binaries, so many of the usual administrative commands are misbehaving. Is this from a rootkit anyone has seen before? This is a production box, and has to stay up for a while yet (the usual bad sort of administrative neglect), so reinstalling from scratch is not an approach I can take this minute. I'm just looking for pointers on what I can expect, so I can hopefully temporarily plug some holes until the box can be rebuilt. TIA. -j ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Fri Feb 22 2002 - 16:19:24 PST