Hi, The following is a quick shell script to find suid binaries that are potentially affected by the zlib vulnability (i.e., those dynamically linked). -[snip]----------------------------------------------------------------- #!/bin/sh # zlibscan by hologram <holo@brained.org> # This will scan to find suid binaries potentially affected by the zlib # vulnerablity. These are important directories for the Linux system, # try different ones for other systems (i.e., /usr/etc, /usr/local/bin). (ldd `find /bin -perm -4000` 2> /dev/null | grep zlib) > zlib.lst (ldd `find /sbin -perm -4000` 2> /dev/null | grep zlib) >> zlib.lst (ldd `find /usr/bin -perm -4000` 2> /dev/null | grep zlib) >> zlib.lst (ldd `find /etc -perm -4000` 2> /dev/null | grep zlib) >> zlib.lst (ldd `find /var -perm -4000` 2> /dev/null | grep zlib) >> zlib.lst -[snap]----------------------------------------------------------------- - hologram