Koozali.org: home of the SME Server

Linux.RST.B FOUND

henrikmc

Linux.RST.B FOUND
« on: November 27, 2005, 07:03:18 PM »
Is Vbox installed with default 6.0.1? Virusscan says:
//var/spool/vbox/zbind: Linux.RST.B FOUND

??

gardnc

Linux.RST.B FOUND
« Reply #1 on: November 28, 2005, 12:06:33 PM »
In my copy of 6.0.1 there is a directory called /var/spool/vbox but there are no files in it.

Offline byte

  • *
  • 2,183
  • +2/-0
Linux.RST.B FOUND
« Reply #2 on: November 28, 2005, 12:27:01 PM »
Nothing in mine either, I would take offline and run the normal check's of a possible break in/infection!
--[byte]--

Have you filled in a Bug Report over @ http://bugs.contribs.org ? Please don't wait to be told this way you help us to help you/others - Thanks!

Offline CharlieBrady

  • *
  • 6,918
  • +3/-0
Linux.RST.B FOUND
« Reply #3 on: November 29, 2005, 04:29:15 AM »
Quote from: "byte"
Nothing in mine either, I would take offline and run the normal check's of a possible break in/infection!


I'd second that opinion. It's almost certain that that file was put there by a remote attacker, who had malicious intentions.

CERT's instructions for recovering from a break-in are here:

http://www.cert.org/nav/recovering.html

You should plan to do a fresh install of a new system, restore your user data, lock all accounts and remove any ssh access keys, and then set new passwords for all active accounts.

henrikmc

Linux.RST.B FOUND
« Reply #4 on: November 29, 2005, 07:11:10 PM »
Quote from: "CharlieBrady"
Quote from: "byte"
Nothing in mine either, I would take offline and run the normal check's of a possible break in/infection!


I'd second that opinion. It's almost certain that that file was put there by a remote attacker, who had malicious intentions.

CERT's instructions for recovering from a break-in are here:

http://www.cert.org/nav/recovering.html

You should plan to do a fresh install of a new system, restore your user data, lock all accounts and remove any ssh access keys, and then set new passwords for all active accounts.


Im not sure about the files being put there by a remote attacker, but rather by a rpm installed.

ssh is enabled but would require the privat key for the root account, which is not likely to be compromized.

If the virus in the zbind exe would have been executed, many more files would have been infected. This tells me the file has not been executed, but it dosent ensure that my system hasen't been compromised...

No unrecocnized deamons are running, no pid's either.

Rkhunter says the system is ok, except for vulnabilities in some of the sme components.

Thanks for the link, great guide there!

Get