The worm's source can be seen at
<http://lists.jammed.com/ISN/2001/04/0087.html>, and it's clear that the
worm only listens on 666, and not 666[0-9].

I tightened up the regex as suggested above and can report no false
positives with bitlebee 1.0.1-1 on this Etch box.  Here's a patch
against chkrootkit version 0.46a-2:

*** chkrootkit  2005-11-26 02:33:38.000000000 -0500
--- /home/james/chkrootkit      2006-02-04 11:06:08.631741440 -0500
***************
*** 722,728 ****
        printn "Searching for LPD Worm files and dirs... "; fi

     if ${egrep} "^kork" ${ROOTDIR}etc/passwd > /dev/null 2>&1  || \
!  ${egrep} "^666" ${ROOTDIR}etc/inetd.conf > /dev/null 2>&1 ;
        then
           echo "Possible LPD worm installed"
        elif [ -d ${ROOTDIR}dev/.kork -o -f ${ROOTDIR}bin/.ps -o  \
--- 722,728 ----
        printn "Searching for LPD Worm files and dirs... "; fi

     if ${egrep} "^kork" ${ROOTDIR}etc/passwd > /dev/null 2>&1  || \
!  ${egrep} "^666\s" ${ROOTDIR}etc/inetd.conf > /dev/null 2>&1 ;
        then
           echo "Possible LPD worm installed"
        elif [ -d ${ROOTDIR}dev/.kork -o -f ${ROOTDIR}bin/.ps -o  \





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to