Saya barusan dapet surat dari milis Linux, yang menanyakan kebenaran adanya
virus di Linux. Mungkin rekan2 bisa membantu. (takut ....)

Linux.Bliss
These are nonmemory resident parasitic viruses written in GNU C. They infect Linux OS 
only - infected files may be executed, and the virus may spread itself only under 
Linux. The viruses search for executable Linux files (ELF internal format) and infect 
them. While infecting the viruses shift the file body down, write themselves to the 
beginning of file and append to the end of file the ID-text: 
"Bliss.a": infected by bliss: 00010002:000045e4
"Bliss.b": infected by bliss: 00010004:000048ac 

It seems that the former hex number in these lines is a virus version, and the latter 
is the virus length - the virus lengths are 17892 and 18604 bytes. 

When an infected file is run, the "Bliss.a" virus searches for not more than three not 
infected files and affects them. "Bliss.b" infects more files (I see not how much). If 
there are no not infected files in the current directory, the virus scans the system 
and infects the files in other directories. After infecting the viruses return control 
to the host program, and it will work correctly. 

Linux is the access-protected system, i.e. users and programs may access only files 
that they have permission to. The same for virus - it may infect only the files and 
directories that are declared as "write-able" for current username. If current 
username has total access (system administrator), the virus will infect all files on 
computer. 

The viruses seem to be "under debugging" and while searching for files and infecting 
them they display several messages: 

already infected
skipping, infected with same vers or different type
replacing older version
replacing ourselves with newer version
infecting: bytes
infect() returning success
been to already!
traversing
our size is
copy() returning success
copy() returning failure
disinfecting:
not infected
couldn't malloc bytes, skipping
couldn't read() all bytes
read bytes
happy_commit() failed, skipping
couldn't write() all bytes, hope you had backups!
successfully (i hope) disinfected
Debugging is ON
Disinfecting files...
using infection log: 

The viruses also contain the text strings: 

dedicated to rkd
/tmp/.bliss
asmlinkage int sys_umask(int mask)
mask&023000 return if(mask&023000) current->uid = current->euid = current->suid = 
current->fsuid = 0; return old&023000} } bliss.%s.%d -l rsh%s%s %s 'cat>%s;chmod 777 
%s;%s;rm -f %s' doing popen("%s" /.rhosts r %s %s .rhosts: %s, %s localhost doing 
do_worm_stuff() /etc/hosts.equiv hosts.equivv: %s HOME --bliss- uninfect-files-please 
disinfect-files-please version %d.%d.%d (%.8x)
CCompiled on Sep 28 1996 at 22:24:03
Written by electric eel.
dont-run-original
just-run-bliss
dont-run-virus
dont-run-bliss
just-run-original
exec
infect-file unsupported version
help help? hah! read the source!
/proc/loadavg %d.
loadav is %d
bliss was run %d sex ago, rep_wait=%d
/tmp/.bliss-tmp.%d execv /bin
PATH : /usr/spool/news /var/spool/news wow 

Linux.Vit.4096
This is a nonmemory resident parasitic virus. The virus has the internal ELF format, 
replicates under Linux OS and infects Linux executable files. This is the second known 
Linux virus, the first is "Linux.Bliss". 
Linux is the access-protected system, i.e. users and programs may access only files 
that they have permission to. The same for virus - it may infect only the files and 
directories that are declared as "write-able" for current username. If current 
username has total access (system administrator), the virus will infect all files on 
computer. 

When an infected file is executed, the virus takes control, searches for executable 
ELF files in the current directory and infects them into the middle. While infecting 
the viruses parses internal file formats (ELF headers), locates first code section, 
makes a "cave" by shifting this and following sections down by 4096 bytes, writes its 
code to this "cave", modifies file entry address and corrects necessary fields in ELF 
headers. 


 Clean file:                                                                           
   Infected file:
 +---------------+                                                      
 ++---------------+
 |  ELF Headers  |--+                                          |  ELF Headers  |--+
 |                                                      |  |                            
 |              |                                                      |  |
 +---------------+  |                                          +---------------+<-+ 
 +virus entry
 |  Section 1          |<-+ entry          +-|          Virus                  |        
 |  address
 |                                                      |          address  | + - - - - 
 |- - - +
 +---------------+                                              +>|  Section 1          
 +|
 |  Section 2          |                                                      |         
 |                                             |
 +---------------+                                                      
 ++---------------+ 
  . . .                                                                                
                  |  Section 2          |
 +---------------+                                                      
 ++---------------+
 |  Section n          |                                                          . . . 
 |                                     
 +---------------+                                                      
 ++---------------+
                                                                                       
                                       |  Section n          |
                                                                                       
                                       +---------------+

The virus cares about duplicate infection and prevents it. The virus infects files 
quite accurate: in tests all infected files were not corrupted, and the virus was able 
to replicate itself from them. 
While infecting the virus uses the temporary VI324.TMP file. The name of this file was 
a reason to select the name for the virus (VIxxx.Txx). 



--
����



    milis ini didukung oleh :
 >> http://www.indolinux.com - dunia linux indonesia
 -------------------------------------------------------------------
 untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
 untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
 arsip berada di  http://www.mail-archive.com/[email protected]
 

Kirim email ke