ktorrent vulnerable?

A. Mani a.mani.cms at gmail.com
Mon Jul 23 16:40:07 UTC 2012


On Mon, Jul 23, 2012 at 4:41 PM, Michael Schwendt <mschwendt at gmail.com> wrote:
>> drwxrwxrwx. root root system_u:object_r:bin_t:s0       /usr/bin
>> drwxrwxrwx. root root system_u:object_r:usr_t:s0       /usr/
>> drwxrwxrwx. root root system_u:object_r:usr_t:s0       /usr/share
>> dr-xr-xr-x. root root system_u:object_r:bin_t:s0       /usr/sbin
>> lrwxrwxrwx. root root system_u:object_r:bin_t:s0       /sbin -> usr/sbin
>
> That's more strange than suspicious.

+1

> I've seen file permissions like that as a result of accidents when playing
> with chmod or bad "make install" scripts.


Very possible.


>
> Have you searched for any modified or hidden files yet?

I forgot to mention that
rkhunter has been run on the system periodically.
Found nothing hidden or suspicious.
Only ifup and ifdown showed a warning, but that  is due to rkhunter.

The ktorrent logs etc in .kde have nothing interesting too.

It does seem that all of it is due to the user's actions.



Best

A. Mani



-- 
A. Mani
CU, ASL, CLC,  AMS, CMS
http://www.logicamani.in
http://www.logicamani.co.cc


More information about the test mailing list