>and
>
>I think this needs to be emphasized...just in case anyone missed it.
>
>"using a potentially compromised gcc, ld, etc."
>
>"using a potentially compromised cp"
>
>And, unless I'm mistaken, the resulting executable will then proceed
>to re-infect everything after cleaning it first. Social engineering,
>or major oversight???

I sent the following to bugtraq, though it has not passed moderation yet:

I think you missed an important part:

    ....so that there are two versions of the executable
    (./temp and ./kill).  It runs ./temp on ./kill, ostensibly to
    clean it, then deletes ./temp.

i.e. is uses ./temp to clean kill, and then the now "clean" kill removes ./temp

Which begs the question, does it /really/ clean temp? 

If the infested temp is run to clean kill, how do we know that temp doesn't re-infect 
kill as fast as it clean it? Does the infecting part happen first (which would seem to 
me to produce a doubly infected binary), and then both infections are removed, or does 
it clean the old infection, then add a new one?



----------------------------------------------------
Jonathan Wilson
System Administrator

Cedar Creek Software     http://www.cedarcreeksoftware.com
Central Texas IT     http://www.centraltexasit.com

_______________________________________________
http://linux.nf -- [EMAIL PROTECTED]
Archives, Subscribe, Unsubscribe, Digest, Etc 
->http://linux.nf/mailman/listinfo/linux-users

Reply via email to