Re: In search of a Linux Virus Scanner

2001-10-01 Thread Alvin Oga
xploit your existing vulnerabilities in your systems insecure.org has lot more exploits posted and test apps than those you posted > It would be more work to make a Linux virus or worm because the designer > would have to take care creating 2 programs as opposed to one. gazillion ways to

RE: In search of a Linux Virus Scanner

2001-10-01 Thread Mullins, Ron
>also sprach Dave Sherohman (on Mon, 01 Oct 2001 04:22:04PM -0500): >> The only virus scanners I am aware of that run under linux are >> designed to scan for Windows viruses in traffic that the linux server >> is handling. McAfee's (NAI) searches for Windows and Unix variants. From the Virus DAT u

Re: In search of a Linux Virus Scanner

2001-10-01 Thread martin f krafft
also sprach Dave Sherohman (on Mon, 01 Oct 2001 04:22:04PM -0500): > The only virus scanners I am aware of that run under linux are > designed to scan for Windows viruses in traffic that the linux server > is handling. are there any that can interface with postfix packaged as debian? i can't find

Re: In search of a Linux Virus Scanner

2001-10-01 Thread Dave Sherohman
ian-announce list. To date, I am not aware of any virus/worm which has exploited vulnerabilities less than a month or two old, so following debian-accounce and applying security updates immediately when they're announced would seem to be a very effective strategy. > Are there any Linux

Re: In search of a Linux Virus Scanner

2001-10-01 Thread Noah Meyerhans
On Mon, Oct 01, 2001 at 01:51:31PM -0400, Theodore Knab wrote: > With the Nimba virus/worm and the Code Red worm breaking Windows > around the globe, I am nervously waiting for the next Linux Worm. > > It would be more work to make a Linux virus or worm because the > designer wou

In search of a Linux Virus Scanner

2001-10-01 Thread Theodore Knab
Hi all, With the Nimba virus/worm and the Code Red worm breaking Windows around the globe, I am nervously waiting for the next Linux Worm. It would be more work to make a Linux virus or worm because the designer would have to take care creating 2 programs as opposed to one. What is being

Re: Adore Linux virus

2001-04-05 Thread Ethan Benson
On Thu, Apr 05, 2001 at 01:17:48PM -0400, Shawn Garbett wrote: > There's a new virus in town. Here's the news for the mouthpiece of Bill > himself: > > http://www.allnetdevices.com/wired/news/2001/04/05/motorola_set.html > It mentions an adorefind program, has anyone run this under Debian? Are >

Re: Linux Virus

2001-04-05 Thread Robert L. Yelvington
http://www.securityfocus.com/ there's a link on the main page regarding latest linux worm and http://www.sans.org/y2k/adore.htm -thx, robt Shawn Garbett wrote: > > Whoops, using a Microsoft Windows box with Netscape here at work, > ugh. Had to fight the @[EMAIL PROTECTED] box just to give me

Linux Virus

2001-04-05 Thread Shawn Garbett
Whoops,  using a Microsoft Windows box with Netscape here at work, ugh. Had to fight the @[EMAIL PROTECTED] box just to give me the correct URL: http://www.msnbc.com/news/554789.asp Tyrin Price wrote: * Shawn Garbett <[EMAIL PROTECTED]> [05Apr01 13:17 -0400]:There's a new virus in town. Here's

Re: Adore Linux virus

2001-04-05 Thread Tyrin Price
* Shawn Garbett <[EMAIL PROTECTED]> [05Apr01 13:17 -0400]: > There's a new virus in town. Here's the news for the mouthpiece of Bill > himself: > > http://www.allnetdevices.com/wired/news/2001/04/05/motorola_set.html > It mentions an adorefind program, has anyone run this under Debian? Are > the

Adore Linux virus

2001-04-05 Thread Shawn Garbett
There's a new virus in town. Here's the news for the mouthpiece of Bill himself: http://www.allnetdevices.com/wired/news/2001/04/05/motorola_set.html It mentions an adorefind program, has anyone run this under Debian? Are there any recommended package upgrades to prevent these latest rounds of

Re: Linux Virus

2001-04-03 Thread Harry Henry Gebel
On Sun, Apr 01, 2001 at 09:23:33AM +, hzi wrote: > When you use wvdial, you read e-mail as root, don't you? Wvdial is probably > the most common way to set up a ppp conection, since it's suggested in the > Debian docuemtntaion. > So I guess my question would be how to use wvdial and still re

Re: Linux Virus

2001-04-01 Thread Brian May
> "Ethan" == Ethan Benson <[EMAIL PROTECTED]> writes: Ethan> sudo with an ALL=ALL entry is just as dangerous (more so Ethan> IMO, because it turns user passwords into multiple root Ethan> passwords) then su. Hopefully one day you will be able to something like this: Obtain a Kerb

Re: Linux Virus

2001-04-01 Thread Ethan Benson
On Sat, Mar 31, 2001 at 11:06:31PM -0800, Karsten M. Self wrote: > on Sat, Mar 31, 2001 at 08:45:25AM -0600, John Hasler ([EMAIL PROTECTED]) > wrote: > > Ethan Benson writes: > > > cat <> ~/.bashrc > > > alias su='su -c ~/.virus' > > > EOF > > > > su might benefit from a configuration file that s

Re: Linux Virus

2001-04-01 Thread Karsten M. Self
on Sat, Mar 31, 2001 at 08:45:25AM -0600, John Hasler ([EMAIL PROTECTED]) wrote: > Ethan Benson writes: > > cat <> ~/.bashrc > > alias su='su -c ~/.virus' > > EOF > > su might benefit from a configuration file that sets the permissable path > for -c. > > Another possible fix might be for bash to

Re: Linux Virus

2001-03-31 Thread Ethan Benson
On Sat, Mar 31, 2001 at 05:54:07PM -0600, John Hasler wrote: > Ethan Benson writes: > > cat <> ~/.bashrc > > export PATH="$HOME/.evil:${PATH}" > > EOF > > > and put a bogus su shell script in ~/.evil > > chmod a-w ~/.bashrc ~/.bash_profile > > .bashrc and .bash_profile should be read-only by def

Re: Linux Virus

2001-03-31 Thread John Hasler
Ethan Benson writes: > cat <> ~/.bashrc > export PATH="$HOME/.evil:${PATH}" > EOF > and put a bogus su shell script in ~/.evil chmod a-w ~/.bashrc ~/.bash_profile .bashrc and .bash_profile should be read-only by default, IMHO. -- John Hasler [EMAIL PROTECTED] (John Hasler) Dancing Horse Hill El

Re: Linux Virus

2001-03-31 Thread John Hasler
hzi writes: > When you use wvdial, you read e-mail as root, don't you? I can't think of any reason why that follows. > Wvdial is probably the most common way to set up a ppp conection, since > it's suggested in the Debian docuemtntaion. Which documentation is that? -- John Hasler [EMAIL PROTECT

Re: Linux Virus

2001-03-31 Thread Erik Steffl
hzi wrote: > > Hi- > > When you use wvdial, you read e-mail as root, don't you? Wvdial is probably > the most common way to set up a ppp conection, since it's suggested in the > Debian docuemtntaion. > > So I guess my question would be how to use wvdial and still remain safe from > "virus".

Re: Linux Virus

2001-03-31 Thread hzi
Hi- When you use wvdial, you read e-mail as root, don't you? Wvdial is probably the most common way to set up a ppp conection, since it's suggested in the Debian docuemtntaion. So I guess my question would be how to use wvdial and still remain safe from "virus". Thank you,

Re: Linux Virus

2001-03-31 Thread Ethan Benson
On Sat, Mar 31, 2001 at 08:45:25AM -0600, John Hasler wrote: > Ethan Benson writes: > > cat <> ~/.bashrc > > alias su='su -c ~/.virus' > > EOF > > su might benefit from a configuration file that sets the permissable path > for -c. interesting idea, somewhat similar to sudo, though i think sudo's

Re: Linux Virus

2001-03-31 Thread Karsten M. Self
on Sat, Mar 31, 2001 at 07:40:45PM +0200, Roberto Diaz ([EMAIL PROTECTED]) wrote: > > Like every so-called Linux virus, it requires the user to behave stupidly > > - it's really a trojan horse. It has the same permission rules as any > > other program, so it can't cha

Re: Linux Virus

2001-03-31 Thread John Hasler
Roberto writes: > What chances do we have to get a virus from a malicious .deb package > someone had leak into debian.org? It would have to acquire the signature of a Debian developer to get into unstable, remain dormant for at least two weeks to get into testing, and lie dormant there until the n

Re: Linux Virus

2001-03-31 Thread Roberto Diaz
> Like every so-called Linux virus, it requires the user to behave stupidly > - it's really a trojan horse. It has the same permission rules as any > other program, so it can't change root-owned files, unless they are > world-writable or you are running as root. > The t

Re: Linux Virus

2001-03-31 Thread John Hasler
Ethan Benson writes: > cat <> ~/.bashrc > alias su='su -c ~/.virus' > EOF su might benefit from a configuration file that sets the permissable path for -c. Another possible fix might be for bash to somehow detect "gain-root" commands and refuse to alias them. -- John Hasler [EMAIL PROTECTED] Dan

Re: Linux Virus

2001-03-31 Thread Ethan Benson
On Fri, Mar 30, 2001 at 05:46:19PM -0800, Karsten M. Self wrote: > > Hmm...dual-booting considered harmful. Interesting. > > Short version being that relying on OS filesystem protections to keep > you from mangling your system files is an invalid assumption if: > > - You're booting multiple

Re: Linux Virus

2001-03-31 Thread Ethan Benson
e root > > > permission? Or can it? > > > > Like every so-called Linux virus, it requires the user to behave stupidly > > - it's really a trojan horse. > > No, it's not a trojan, it's a virus. > > A trojan, classic definition, is a program th

Re: Linux Virus

2001-03-30 Thread Karsten M. Self
on Wed, Mar 28, 2001 at 10:53:33PM -0500, William T Wilson ([EMAIL PROTECTED]) wrote: > On Thu, 29 Mar 2001, Mark Devin wrote: > > > Surely this virus cannot overwrite executables that require root > > permission? Or can it? > > Like every so-called Linux virus, it req

Re: Linux Virus

2001-03-30 Thread Karsten M. Self
on Wed, Mar 28, 2001 at 07:11:00PM -0900, Ethan Benson ([EMAIL PROTECTED]) wrote: > On Wed, Mar 28, 2001 at 10:53:33PM -0500, William T Wilson wrote: > > On Thu, 29 Mar 2001, Mark Devin wrote: <...> > > The thing that's special about it is that it can infect both Windows and > > Linux executable

Re: Linux Virus

2001-03-29 Thread Dave Sherohman
On Wed, Mar 28, 2001 at 10:19:10PM -0500, Ben Collins wrote: > Anyone can do that. I can write a C program and send it to you that > emails me /etc/passwd and /etc/shadow. You still have to be dumb enough > to execute it. That's not a virus, that's social trickery. Now, if it > emails itself (and r

RE: Linux Virus

2001-03-29 Thread Joris Lambrecht
This article might point out some things http://www.theregister.co.uk/content/8/17938.html -Original Message- From: John Griffiths [mailto:[EMAIL PROTECTED] Sent: donderdag 29 maart 2001 5:08 To: Ben Collins Cc: Mark Devin; Debian-user Subject: Re: Linux Virus At 10:00 PM 3/28/2001

Re: Linux Virus

2001-03-28 Thread brian moore
On Wed, Mar 28, 2001 at 10:43:12PM -0500, Ben Collins wrote: > Arguably, there is less of a chance of that under Linux. Most people who > use Windows (like 99.9%) use either Outlook, Eudora or Netscape for > email. On Linux, the numbers cannot be used against it. If you target a > Lin

Re: Linux Virus

2001-03-28 Thread Rich Puhek
Well... remember that most of the recent Melissa style worms are slapped together with Visual Basic... Not a great risk that ext2 support will show up :-) --Rich ...and the paperclip winked at me and said: "It looks like you're writing a macro virus... Would you like help?" (another stolen .sig)

Re: Linux Virus

2001-03-28 Thread Ethan Benson
On Wed, Mar 28, 2001 at 10:53:33PM -0500, William T Wilson wrote: > On Thu, 29 Mar 2001, Mark Devin wrote: > > > Surely this virus cannot overwrite executables that require root > > permission? Or can it? > > Like every so-called Linux virus, it requires the user to

Re: Linux Virus

2001-03-28 Thread William T Wilson
On Thu, 29 Mar 2001, Mark Devin wrote: > Surely this virus cannot overwrite executables that require root > permission? Or can it? Like every so-called Linux virus, it requires the user to behave stupidly - it's really a trojan horse. It has the same permission rules as any other pro

Re: Linux Virus

2001-03-28 Thread Ben Collins
e aspects of their replication, > and the cunning nature of their social engineering. Arguably, there is less of a chance of that under Linux. Most people who use Windows (like 99.9%) use either Outlook, Eudora or Netscape for email. On Linux, the numbers cannot be used against it. If you target

Re: Linux Virus

2001-03-28 Thread John Griffiths
t 10:29 PM 3/28/2001 -0500, Ben Collins wrote: >On Thu, Mar 29, 2001 at 01:26:39PM +1000, John Griffiths wrote: >> >IMO, this is nothing completely new or innovative. ASM has been around a >> >long time, even before viruses. It all boils down to people being smart >> >enough not to accept attachmen

Re: Linux Virus

2001-03-28 Thread Ben Collins
On Thu, Mar 29, 2001 at 01:26:39PM +1000, John Griffiths wrote: > >IMO, this is nothing completely new or innovative. ASM has been around a > >long time, even before viruses. It all boils down to people being smart > >enough not to accept attachments form people they don't know, and > >especially d

Re: Linux Virus

2001-03-28 Thread John Griffiths
>IMO, this is nothing completely new or innovative. ASM has been around a >long time, even before viruses. It all boils down to people being smart >enough not to accept attachments form people they don't know, and >especially don't execute programs sent to you randomly over the >internet. Agreed u

Re: Linux Virus

2001-03-28 Thread Ben Collins
On Thu, Mar 29, 2001 at 01:07:49PM +1000, John Griffiths wrote: > At 10:00 PM 3/28/2001 -0500, Ben Collins wrote: > >On Thu, Mar 29, 2001 at 12:55:16PM +1000, Mark Devin wrote: > >> Does anyone know anything further on this new W32.Winux virus. > >> Check out this link: > >> http://news.cnet.com/ne

Re: Linux Virus

2001-03-28 Thread John Griffiths
At 10:00 PM 3/28/2001 -0500, Ben Collins wrote: >On Thu, Mar 29, 2001 at 12:55:16PM +1000, Mark Devin wrote: >> Does anyone know anything further on this new W32.Winux virus. >> Check out this link: >> http://news.cnet.com/news/0-1003-200-5329436.html?tag=st.cn.1.lthd >> >> Surely this virus canno

Re: Linux Virus

2001-03-28 Thread Ben Collins
On Thu, Mar 29, 2001 at 12:55:16PM +1000, Mark Devin wrote: > Does anyone know anything further on this new W32.Winux virus. > Check out this link: > http://news.cnet.com/news/0-1003-200-5329436.html?tag=st.cn.1.lthd > > Surely this virus cannot overwrite executables that require root > permission

Linux Virus

2001-03-28 Thread Mark Devin
Does anyone know anything further on this new W32.Winux virus. Check out this link: http://news.cnet.com/news/0-1003-200-5329436.html?tag=st.cn.1.lthd Surely this virus cannot overwrite executables that require root permission? Or can it? Cheers. Mark.