Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: general_re
"This virus searches for executable ELF files in the current and /bin directories and infects them. When infecting files, it writes itself to the middle of the file, at the end of a section of code, which pushes the other sections lower down. It also contains a backdoor, which downloads scripts from another site, and executes them, using a standard shell."

Maybe on Linspire - a Linux for newbies that logs users on as root (like WinderzXP). Not on my Debian box.

21 posted on 09/21/2005 8:50:25 AM PDT by PokeyJoe (There are 10 kinds of people in the world. Those who understand binary, and those that don't.)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: PokeyJoe

Assuming you're not running as a privileged user, sure. Of course, it'll still try to touch every file it can - run one as root later on, and you're hosed ;)


23 posted on 09/21/2005 9:01:34 AM PDT by general_re ("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
[ Post Reply | Private Reply | To 21 | View Replies ]

To: PokeyJoe

Surely it's not that simple.

You would normally su to root to install the software. While unzipping and untarring the executables wouldn't do anything, they probably contain executables will be owned by root and can therefore run as root if the suid bit is turned on.

So even if you're browsing the web as Joe Blow, you might not be safe.

Of course, most savvy Unix SAs install things like web servers under an account like 'nobody' that is deliberately designed to have no privileges at all. But many would unthinkingly su to root to install client software on workstation machines.


25 posted on 09/21/2005 9:08:22 AM PDT by proxy_user
[ Post Reply | Private Reply | To 21 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson