public inbox for speakup@linux-speakup.org
 help / color / mirror / Atom feed
From: "Alex Snow" <alex_snow@gmx.net>
To: <speakup@braille.uwo.ca>
Subject: Re: [pehrens@ligo.caltech.edu: Re: Nmap *NOT* affected by libpcap trojan]
Date: Wed, 13 Nov 2002 19:44:54 -0500	[thread overview]
Message-ID: <000d01c28b77$0d1d7a80$6401a8c0@computer> (raw)
In-Reply-To: <20021114000720.GC6936@lrxms.net>

Yeah that's why it's getting increasingly important to digitally sign files
before releasing them, so that way you can tell if someone screwed witht he
file.
Explorer has caused a general protection fault in module kernel32.dll. I'm
sick of Winblows!
----- Original Message -----
From: "Scott Howell" <showell@lrxms.net>
To: <speakup@braille.uwo.ca>
Sent: Wednesday, November 13, 2002 7:07 PM
Subject: [pehrens@ligo.caltech.edu: Re: Nmap *NOT* affected by libpcap
trojan]


> Folks, I am subscribed to the list about Nmap. This info might e very
> interesting to folks. I have not had a chance to verify all the info nor
> have I seen anything from Bug Track, but that could be more a problem
> with not geting mail from my ISP. In any case, if anyone does know more,
> please share.
>
> tnx
>
>
> ----- Forwarded message from Philip Ehrens
<pehrens@ligo.caltech.edu> -----
>
> Mailing-List: contact nmap-hackers-help@insecure.org; run by ezmlm
> From: Philip Ehrens <pehrens@ligo.caltech.edu>
> To: Fyodor <fyodor@insecure.org>
> Cc: nmap-hackers@insecure.org
> Subject: Re: Nmap *NOT* affected by libpcap trojan
> Mail-Followup-To: Philip Ehrens <pehrens@lrxms.net>,
> Fyodor <fyodor@insecure.org>, nmap-hackers@insecure.org
>
> I would like to point out that the type of trojan described below
> is becoming increasingly common.  ftp.sendmail.org was compromised
> recently and a similar trojan was placed in the sendmail source
> tarball.
>
> I know of at least 12 common packages that have had their source
> tarballs compromised within the last 3 months on servers that were
> considered secure.  The folks doign this have gone as far as to
> hijack DNS and root machines on specific subnets in order to place
> this type of trojan.
>
> These trojans are activated during te build process of the source
> tarball in most cases, usually the configure script contains some
> variation of code that establishes a connection to a remote machine.
>
> I believe that the folks doing this are actually trying to catch
> certain specific machines or subnets, and are not doing this to
> set up DDOS or just to own large numbers of boxes.  When I activated
> one of these trojans while building a package all that happened was
> that my /etc/passwd file was shipped off.  The machine listening on
> the other end never did anything except stay connected for a while.
>
> I expect to see more and more of this at an accellerating rate
> from now on...  if you are letting root make remote connections
> you are asking for trouble!
>
> Sorry for using your list for this Fyodor, I won't do it again.
>
> Phil
>
> Fyodor wrote:
> > I just wanted to send out a quick note that the version of libpcap
> > shipped with Nmap does NOT contain the trojan described at:
> >
> > http://hlug.fscker.com/
> >
http://slashdot.org/article.pl?sid=02/11/13/1255243&mode=nested&tid=172&thre
shold=3
> >
> > Cheers,
> > -F
>
> --------------------------------------------------
> For help using this (nmap-hackers) mailing list, send a blank email to
> nmap-hackers-help@insecure.org . List run by ezmlm-idx (www.ezmlm.org).
>
> ----- End forwarded message -----
>
> _______________________________________________
> Speakup mailing list
> Speakup@braille.uwo.ca
> http://speech.braille.uwo.ca/mailman/listinfo/speakup
>



  reply	other threads:[~ UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
 Scott Howell
 ` Alex Snow [this message]
   ` Igor Gueths
     ` Alex Snow

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='000d01c28b77$0d1d7a80$6401a8c0@computer' \
    --to=alex_snow@gmx.net \
    --cc=speakup@braille.uwo.ca \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).