Skip to comments.
Infected Files Found on Mozilla Site (Korean Linux binaries infected - oh, my!)
Viruslist.com ^
| September 20, 2005
| Viruslist.com
Posted on 09/21/2005 7:57:22 AM PDT by general_re
Infected binary or source code files aren't anything new. And sometimes they are found on public servers. Mozilla.org is the latest example. Korean distributives for mozilla and thunderbird for linux turned out to be infected - mozilla-installer-bin from mozilla-1.7.6.ko-KR.linux-i686.installer.tar.gz and mozilla-xremote-client from thunderbird-1.0.2.tar.gz were infected with Virus.Linux.RST.b
This virus searches for executable ELF files in the current and /bin directories and infects them. When infecting files, it writes itself to the middle of the file, at the end of a section of code, which pushes the other sections lower down. It also contains a backdoor, which downloads scripts from another site, and executes them, using a standard shell.
The infected files have now been removed, but it took some time. And this isn't the first time that infected binary or source code files have been placed on public servers. Yet another example of why you should have an up to date antivirus solution, and scan EVERYTHING you download, without exception.
TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Miscellaneous; News/Current Events; Technical
KEYWORDS: linosandtigersohmy; linux; lionsandtigersohmy; mozilla; opensource; thunderbird; virus
Navigation: use the links below to view more comments.
first 1-20, 21-40 next last
Per Slapdash. I predict great fun from this, so none of that reasoned discourse nonsense from you people ;)
To: ShadowAce
2
posted on
09/21/2005 8:00:26 AM PDT
by
general_re
("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
To: general_re
Right after the Linux manifesivos stuck foot in mouth over
Symantec's study!
3
posted on
09/21/2005 8:00:27 AM PDT
by
Dan Nunn
To: general_re
A tripwire daemon would catch the changed size of the executables, right?
To: general_re
CP/M - The only way to go.
5
posted on
09/21/2005 8:03:56 AM PDT
by
Tennessee_Bob
("Nac Mac Feegle! The Wee Free Men! Nae king! Nae quin! Nae laird! We willna be fooled again!")
To: general_re
This is as I predicted here on FR last year (and got thoroughly trashed as being a complete ignoramus). I love Firefox. I'm using it right now, but Mozilla used to benefit from its relative anonymity. Why go after it when you could screw up the day of millions of Windows' users.
Well, boys and girls, success has now made Mozilla a target....
6
posted on
09/21/2005 8:04:27 AM PDT
by
freebilly
(Go USF Baseball!)
To: proxy_user
I'm not sure how it would do so. On the client end, how does your machine know the proper filesize the first time it's downloaded? On the server end, how does the server know the proper filesize the first time it's uploaded?
After that, if the file is modified, then a Tripwire-type solution should catch it, I would think. In the mean time, everyone's checking those MD5 sums, right?
7
posted on
09/21/2005 8:04:29 AM PDT
by
general_re
("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
To: Tennessee_Bob
CP/M - The only way to go. There's probably only about ten people on FR that get that statement!.............LOL!!!!.....
8
posted on
09/21/2005 8:07:55 AM PDT
by
Red Badger
(I was born in poverty. I didn't like it, so I left.............)
To: Tennessee_Bob; Red Badger
I am having vaguely queasy memories of ddt... ;)
9
posted on
09/21/2005 8:10:27 AM PDT
by
general_re
("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
To: freebilly
Well, boys and girls, success has now made Mozilla a target....
You're right - eventually Mozilla will be more of a target, but in this case, technically, this is not a Mozilla exploit, it's a Linux virus which happens to have infected Mozilla install files, probably because the download server is running Linux and got infected.
10
posted on
09/21/2005 8:13:24 AM PDT
by
fr_freak
To: Tennessee_Bob
Yup. Time to dust off the old Kaypro and get back to REAL computing, eh?
11
posted on
09/21/2005 8:14:08 AM PDT
by
MineralMan
(godless atheist)
To: Tennessee_Bob
CP/M - The only way to go. Long Live the 8-inch Floppy!
You know, I really don't trust those double-sided, double density discs ...
12
posted on
09/21/2005 8:15:48 AM PDT
by
ArrogantBustard
(Western Civilisation is aborting, buggering, and contracepting itself out of existence.)
To: MineralMan
Started in CP/M on my old Commodore 128. Back in the day of the true power machine.
13
posted on
09/21/2005 8:20:47 AM PDT
by
Tennessee_Bob
("Nac Mac Feegle! The Wee Free Men! Nae king! Nae quin! Nae laird! We willna be fooled again!")
To: ArrogantBustard
You know, I really don't trust those double-sided, double density discs ... You gotta be careful with them as data could bleed through from the other side.
I never had to deal with viruses when I programmed on my breadboard.
14
posted on
09/21/2005 8:26:20 AM PDT
by
Sensei Ern
(Christian, Comedian, Husband,Opa, Dog Owner, former Cat Co-dweller, and all around good guy.)
To: general_re
To: Sensei Ern
"You gotta be careful with them as data could bleed through from the other side."
Especially if you used a hole-puncher to turn a single-sided disc into a double-sided one.
16
posted on
09/21/2005 8:31:08 AM PDT
by
Moral Hazard
("Now therefore kill every male among the little ones" - Numbers 31:17)
To: general_re
Yet another example of why you should have an up to date antivirus solution, and scan EVERYTHING you download, without exception.Another important step is get the package signatures (MD5, SHA, PGP, etc) from a different service and compare to the signature of the downloaded package. Some folks download the source and compile to produce just the signatures as a public service.
I don't see this mentioned anywhere on the mozilla page, btw. However it's mentioned in the developer side. Other open source binaries (e.g. Apache, OpenOffice, etc) usually are distributed with signatures.
17
posted on
09/21/2005 8:34:07 AM PDT
by
no-s
To: fr_freak; freebilly
probably because the download server is running Linux and got infected.yah, good point. Furthermore:
http://mozilla.or.kr/
This is not official site of Mozilla Foundation and maintained by volunteers of by Mozilla Korean Communuty.
18
posted on
09/21/2005 8:39:29 AM PDT
by
no-s
To: general_re
Sometimes, it's important to dig a little deeper. In this case, it was not mozilla.org that had the infected binaries, but rather a Mozilla fan site in Korea. This should not need repeating, but it's probably not safe to donwload programs from arbitrary servers on the Internet.
You can continue to safely download files from mozilla.org
19
posted on
09/21/2005 8:41:55 AM PDT
by
duckhead
To: duckhead
Yes, the writeup was not clear on that point.
20
posted on
09/21/2005 8:50:18 AM PDT
by
general_re
("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
Navigation: use the links below to view more comments.
first 1-20, 21-40 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson