David Bolt wrote:
> On Mon, 21 Jan 2008, Joe Sloan wrote:-
>
>   
>> David Bolt wrote:
>>     
>
> <Snip>
>
>   
>> It's not a matter of blind trust, but of close examination of the worms
>> behavior. Once the hole was closed and the remains of the worm removed,
>> that was the end of it. No more mysterious traffic, no more odd spikes
>> in system load, no more trouble, no anomalies on the system, full
>> package check shows everything in order.
>>     
>
> In that case, you're lucky that someone didn't use the worm to use some
> unknown, or freshly discovered, local root exploit to be able to install
> a root kit.
>
>   

I'm sure they tried. It's a awfully tough job trying to get root
remotely on a modern linux box...

Joe
-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to