home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!mcsun!uknet!dsbc!kev
- From: kev@dsbc.icl.co.uk (Kevin Walsh)
- Newsgroups: comp.security.misc
- Subject: Re: early Trojan Horse
- Message-ID: <956@dsbc.icl.co.uk>
- Date: 19 Nov 92 15:15:03 GMT
- References: <1992Nov18.202710.9652@mcs.kent.edu>
- Organization: Cursor Software Limited, London, England
- Lines: 22
-
- In article <1992Nov18.202710.9652@mcs.kent.edu> keithf@Nimitz.mcs.kent.edu (Keith Fuller) writes:
- >
- > I heard that early UNIX systems came with a Trojan Horse.
- > As I remember, the C compiler would compile one of the utilities
- > in a way that would give a knowledgable person entry into any UNIX
- > system.
- >
- > Does anyone know anything about this?
- > Like some other people who are asking such questions,
- > I am indeed writing a term paper on UNIX security.
- >
- As I remember it, cc used to recognize a peice of code as being
- from the login program. When you compiled login, the resulting
- executable would have a back door login in it.
-
- You could log in as "bell" and get in as root.
-
- --
- _/ _/ _/_/_/_/ _/ _/ _/_/_/ _/ _/
- _/_/_/ _/_/ _/ _/ _/ _/_/ _/ K e v i n W a l s h
- _/ _/ _/ _/ _/ _/ _/ _/_/ kev@dsbc.icl.co.uk
- _/ _/ _/_/_/_/ _/ _/_/_/ _/ _/
-