Date: Mon, 4 Aug 1997 09:49:56 +0000 (GMT) From: "Lenzi, Sergio" <lenzi@bsi.com.br> To: Tom Samplonius <tom@sdf.com> Cc: Dan Riley <daniel@vailsys.com>, hackers@freebsd.org Subject: Re: security hole on FreeBSD 2.2.2 Message-ID: <Pine.BSF.3.96.970804091803.3356B-100000@sergio> In-Reply-To: <Pine.BSF.3.95q.970801171241.8042A-100000@misery.sdf.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 1 Aug 1997, Tom Samplonius wrote: > Huh? I'm looking at /usr/bin/ on couple of 2.2.2 machines and there is > no superl*... what is that file supposed to be anyhow? > > Are you sure you did not install from a tainted distribution that had a > backdoor installed? Or, were you fooled in running a trojan horse as root > and it created the superl* file? > I think not, an ls -al from the /cdrom/usr/bin | grep perl (WC second cd) shows.... -r-xr-xr-x 2 bin bin 307200 May 20 10:32 curseperl -r-xr-xr-x 2 bin bin 274432 May 20 10:32 perl ---s--x--x 4 root bin 282624 May 20 10:32 sperl4.036 ---s--x--x 4 root bin 282624 May 20 10:32 suidperl -r-xr-xr-x 4 bin bin 282624 May 20 10:32 tperl -r-xr-xr-x 4 bin bin 282624 May 20 10:32 tperl4.036 the pgrogram in question is superl4.036. Sergio Lenzi.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.970804091803.3356B-100000>