Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 4 Aug 1997 09:49:56 +0000 (GMT)
From:      "Lenzi, Sergio" <lenzi@bsi.com.br>
To:        Tom Samplonius <tom@sdf.com>
Cc:        Dan Riley <daniel@vailsys.com>, hackers@freebsd.org
Subject:   Re: security hole on FreeBSD 2.2.2
Message-ID:  <Pine.BSF.3.96.970804091803.3356B-100000@sergio>
In-Reply-To: <Pine.BSF.3.95q.970801171241.8042A-100000@misery.sdf.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 1 Aug 1997, Tom Samplonius wrote:

>   Huh?  I'm looking at /usr/bin/ on couple of 2.2.2 machines and there is
> no superl*... what is that file supposed to be anyhow?
> 
>   Are you sure you did not install from a tainted distribution that had a
> backdoor installed?  Or, were you fooled in running a trojan horse as root
> and it created the superl* file?
> 

I think not,

an ls -al from the /cdrom/usr/bin | grep perl (WC second cd) shows....

-r-xr-xr-x   2 bin   bin     307200 May 20 10:32 curseperl
-r-xr-xr-x   2 bin   bin     274432 May 20 10:32 perl
---s--x--x   4 root  bin     282624 May 20 10:32 sperl4.036
---s--x--x   4 root  bin     282624 May 20 10:32 suidperl
-r-xr-xr-x   4 bin   bin     282624 May 20 10:32 tperl
-r-xr-xr-x   4 bin   bin     282624 May 20 10:32 tperl4.036

the pgrogram in question is superl4.036.




Sergio Lenzi.





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.970804091803.3356B-100000>