Security Incidents mailing list archives

re: Systems compromised with ShellBOT perl script - part 2


From: Jim Halfpenny <jim () openanswers co uk>
Date: Wed, 20 Oct 2004 17:14:27 +0100 (BST)



On Wed, 20 Oct 2004 security () kemhosting com wrote:

Today, hackers used the ShellBOT perl script to bring down Apache and start up
their IRC listener.  They (somehow) copied it into /tmp and executed it.  This
confuses me because I have my /tmp directory mounted rw,noexec,nosuid. Does
Perl somehow bypass this?

Instead of running...

$ /tmp/perlscript.pl

they just have to run...

$ perl /tmp/perlscript.pl

Perl will read the file in /tmp, so no attempt is made to execute it
directly.

Regards,
Jim Halfpenny


Current thread: