Package: chkrootkit
Version: 0.46a-3
Severity: normal

I have this running:

[EMAIL PROTECTED]:~% ps axf|grep inetd
20437 pts/26   S+     0:00  |       \_ /usr/bin/ssh dumbledore /home/paul/redir 
--inetd --caddr=cugel --cport=22

getCMD "inetd" finds this, and checks /usr/bin/ssh using a regex appropriate
for inetd.  This reports inetd as infected, since of course ssh contains the
string "/bin/sh".  I had to debug chkrootkit by hand to figure out what
binary it actually tested (nice to log that), and why it thought it was
infected.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-rc1
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages chkrootkit depends on:
ii  binutils             2.16.1cvs20060117-1 The GNU assembler, linker and bina
ii  debconf [debconf-2.0 1.4.72              Debian configuration management sy
ii  libc6                2.3.6-4             GNU C Library: Shared libraries an
ii  net-tools            1.60-17             The NET-3 networking toolkit
ii  procps               1:3.2.6-2.1         /proc file system utilities

chkrootkit recommends no packages.

-- debconf information:
* chkrootkit/run_daily_opts: -q -n
* chkrootkit/run_daily: true
* chkrootkit/diff_mode: true


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to