Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Ernest_at_the_Beach
Before anyone gets worked up about this:

This is a LOCAL exploit. The attack must be launched by an authenticated user that is already logged on.

Unless you are granting shell command access to users, a Linux server is not vulnerable to a remote attack.

If you are using Linux on your desktop, just be aware of what you download and run on your desktop (the same advice I'd give to Windows users)

12 posted on 09/21/2010 9:36:02 AM PDT by justlurking (The only remedy for a bad guy with a gun is a good WOMAN (Sgt. Kimberly Munley) with a gun)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: justlurking; ShadowAce

Well....that changes everything....thanks.


14 posted on 09/21/2010 9:38:55 AM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 12 | View Replies ]

To: justlurking

That might be true for desktops, but for Linux servers running any kind of PHP or CGI, all it takes is a hole in the code and you’re rooted.

And if you use a hosting provider who uses a paravirtualized environment like Slicehost or some of the other VPS hosts, I’ve heard that patches are not available yet.


15 posted on 09/21/2010 9:42:03 AM PDT by perfect_rovian_storm (Chuck Norris wears Carl Paladino pajamas.)
[ Post Reply | Private Reply | To 12 | View Replies ]

To: justlurking
Reading the comments at HardOCP:

Linux Kernel Exploit Wreaking Havoc

The usual snarky comments from the Gamers....but this was of interest.

************************************EXCERPT************************************

Dragoniz3rn00bie, 2.1 Years

 
Dragoniz3r is offline
Nothing to see here.

This has been tremendously overblown by ksplice in the interest of furthering the sales of their product. It's a local exploit, which means the attacker has to already be logged in to your box. It's not a remote exploit.

Oh, and by the way, after looking for the source code for their "detection tool", there is no way in hell I'm running it. It's copy+paste of the original exploit code, and there are some things in it that are very very difficult to verify the safety of (like embedded machine code)

17 posted on 09/21/2010 10:01:55 AM PDT by Ernest_at_the_Beach ( Support Geert Wilders)
[ Post Reply | Private Reply | To 12 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson