Package: chkrootkit
Version: 0.44-2
Severity: normal

When mlnet (the mldonkey server) is running, chkrootkit wrongly detects
it:

   Checking `bindshell'... INFECTED (PORTS:  4000)

(indeed mlnet is listening on port 4000 and stopping it gets rid of the
spurious detetcion).

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (700, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.11-rc2
Locale: LANG=C, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)

Versions of packages chkrootkit depends on:
ii  binutils                    2.15-5       The GNU assembler, linker and bina
ii  debconf                     1.4.48       Debian configuration management sy
hi  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  net-tools                   1.60-10      The NET-3 networking toolkit

-- debconf information:
* chkrootkit/run_daily_opts: -q
* chkrootkit/run_daily: true


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to