On Wed, 28 Mar 2001, Diana Cionoiu wrote: 

> Motivul pentru care imi place Linuxul , unix-ul in general e ca nu egzista

> virusi, shi ideea de virushi sub linux e o prostie ingrozitoare. 

Si mie-mi place, dar n-as fi chiar asa de categoric in afirmatii. 
Gandeste-te numai ca vei ramane fara SO-ul preferat cand o sa intalnesti 
un asemenea virus :) 
Din cate am auzit, au iesit pe piatza (...) chiar ceva virusi sub forma de 
module kernel. Cum prinde virusul asta root ca sa se incarce, treaba 
lui...Da' io nu vad vreun motiv pentru care n-ar putea exista asa ceva. 

Ovidiu #1 

Vierme/picatura  Chinezesc/a 

Name: Linux/Lion 
Type: Linux worm. 
Date: 27 March 2001 

Description: 

Linux/Lion is an internet worm written for the Linux operating 
system. It is similar to Linux/Ramen (i.e. one of the worm files 
is already detected as Linux/Ramen). 

It spreads by scanning random class B IP networks for hosts 
that are vulnerable to a remote exploit in the Bind name service 
daemon. Once it has found a candidate for infection it attacks 
the remote machine and, if successful, downloads and installs a 
package from coollion.51.net. This package contains a copy of 
the worm and also the t0rn rootkit. The rootkit is designed to 
hide the presence of the worm by replacing many of the system 
binaries with trojaned versions and cleaning the log files. In 
particular, the following files may be created or changed: 

/usr/sbin/nscd 
/bin/in.telnetd 
/bin/mjy 
/usr/sbin/in.fingerd 
/bin/ps 
/sbin/ifconfig 
/usr/bin/du 
/bin/netstat 
/usr/bin/top 
/bin/ls 
/usr/bin/find 

The following directories may also be created: 

/usr/man/man1/man1/lib/.lib 
/usr/src/.puta 
/usr/info/.t0rn 
/dev/.lib 

The worm keeps itself active during reboots by appending some 
lines to /etc/rc.d/rc.sysinit disguised with the comment 'Name 
Server Cache Daemon..'. It also deletes /etc/hosts.deny and 
appends lines to /etc/inetd.conf to leave a root shell on port 
1008. Finally, it emails the contents of /etc/passwd, 
/etc/shadow and the output from ifconfig -a, to an address in 
the china.com domain. 
  
#2 

Name: W32/Lindose 
Aliases: ELF/Lindose, W32/Winux, W32.PEElf.2132 
Type: W32 executable file virus and Linux ELF executable file 
virus 
Date: 28 March 2001 
  

Description: 

W32/Lindose is the first cross-platform virus to infect both 
Windows PE executable files and Linux ELF executable files. 

When the virus is executed, it searches for PE and ELF files in 
the current directory and other directories above the current 
one in the directory tree. If a PE file is found, the virus 
looks for the .reloc section, and if the section is large 
enough, overwrites it with the virus code. 

If an ELF executable file is found, the virus appends the 
uninfected original host code to the end of the file, so that it 
can be restored and run in memory after the virus code stops 
running. It also overwrites the original entry point with the 
virus code. 

The virus body contains the text: 

    "[Win32/Linux.Winux] multi-platform virus by Benny/29A" 

and 

    "This GNU program is covered by GPL." 
  
  
---
Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to 
unsubscribe from this list.

Raspunde prin e-mail lui