Hi

I read about the irssi problem.

One thing I don't understand:
>From the irssi website:
"...but possibly it ran a rootkit or whatever and you'll need to reinstall 
your whole system."

The backdoor is in the configure script.
How can a rootkit be installed on the machine ?

./configure is not executed by root (if the user does it right).


Does make install also use the script ?

If the atacker has normal user access than this is bad, but not a real 
problem.


thanks
have fun
Felix

Reply via email to