Peter Thomassen [EMAIL PROTECTED] writes:
Package: chkrootkit
Version: 0.45-1
If the Erlang portmapper daemon (epmd) included in erlang-base is running,
chkrootkit reports:
| Checking `bindshell'... INFECTED (PORTS: 4369)
This is wrong, please fix this.
For reference, using
Am Donnerstag, 24. November 2005 22:50 schrieb lantz moore:
bindshell listens on port 4369. chkrootkit bases it's checks simply on
whether the port is being listened on. this is the design that upstream
prefers, so this will not be fixed (any time soon).
Is there any possibility, e.g. a
Peter Thomassen [EMAIL PROTECTED] writes:
Am Donnerstag, 24. November 2005 22:50 schrieb lantz moore:
bindshell listens on port 4369. chkrootkit bases it's checks simply on
whether the port is being listened on. this is the design that upstream
prefers, so this will not be fixed (any time
Package: chkrootkit
Version: 0.45-1
If the Erlang portmapper daemon (epmd) included in erlang-base is running,
chkrootkit reports:
| Checking `bindshell'... INFECTED (PORTS: 4369)
This is wrong, please fix this.
For reference, using erlang-base 1:10.b.1a-2.2 from unstable, epmd is located
4 matches
Mail list logo