The worm's source can be seen at <http://lists.jammed.com/ISN/2001/04/0087.html>, and it's clear that the worm only listens on 666, and not 666[0-9].
I tightened up the regex as suggested above and can report no false positives with bitlebee 1.0.1-1 on this Etch box. Here's a patch against chkrootkit version 0.46a-2: *** chkrootkit 2005-11-26 02:33:38.000000000 -0500 --- /home/james/chkrootkit 2006-02-04 11:06:08.631741440 -0500 *************** *** 722,728 **** printn "Searching for LPD Worm files and dirs... "; fi if ${egrep} "^kork" ${ROOTDIR}etc/passwd > /dev/null 2>&1 || \ ! ${egrep} "^666" ${ROOTDIR}etc/inetd.conf > /dev/null 2>&1 ; then echo "Possible LPD worm installed" elif [ -d ${ROOTDIR}dev/.kork -o -f ${ROOTDIR}bin/.ps -o \ --- 722,728 ---- printn "Searching for LPD Worm files and dirs... "; fi if ${egrep} "^kork" ${ROOTDIR}etc/passwd > /dev/null 2>&1 || \ ! ${egrep} "^666\s" ${ROOTDIR}etc/inetd.conf > /dev/null 2>&1 ; then echo "Possible LPD worm installed" elif [ -d ${ROOTDIR}dev/.kork -o -f ${ROOTDIR}bin/.ps -o \ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]