On Wed, Mar 28, 2001 at 10:53:33PM -0500, William T Wilson wrote:
> On Thu, 29 Mar 2001, Mark Devin wrote:
> 
> > Surely this virus cannot overwrite executables that require root
> > permission? Or can it?
> 
> Like every so-called Linux virus, it requires the user to behave stupidly
> - it's really a trojan horse.  It has the same permission rules as any
> other program, so it can't change root-owned files, unless they are
> world-writable or you are running as root.

or your running MacOSX where pretty much all binaries are writable by
the default user account.  

> The thing that's special about it is that it can infect both Windows and
> Linux executables - which is really quite impressive.  Otherwise it's
> nothing special.

something more nefarious would be for the virus when run from windows
to find linux partitions and use internal ext2 support to modify
binaries on the linux filesystems.   

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

Attachment: pgpqGGpOEF0Gb.pgp
Description: PGP signature

Reply via email to