Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 01/29/2014 11:05:37 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies ]


To: rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; Still Thinking; ...

2 posted on 01/29/2014 11:06:01 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Just Another Vulnerability Announcement


3 posted on 01/29/2014 11:41:11 AM PST by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

So.. does the malware this thing downloads work on Linux?


4 posted on 01/29/2014 11:42:30 AM PST by GeronL (Vote for Conservatives not for Republicans!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

For Linux – /etc/init.d/

I guess I must have already given this shady java app root permissions. I have to stop doing that.


7 posted on 01/29/2014 11:50:28 AM PST by perfect_rovian_storm
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce
Interesting. Looking at the details, it needs root on unix systems to install itself in /etc/init.d/ also, it's pretty clear that though the code is obfuscated, the files themselves are not.
  sudo find /home -name jsuid.dat

... will definitely tell you if it's been installed.

Rule #1. Don't run as root!
Rule #2. Require a passwd for sudo!
Rule #3. If you don't need java, don't install it!

8 posted on 01/29/2014 12:17:10 PM PST by zeugma (Is it evil of me to teach my bird to say "here kitty, kitty"?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

What can be done about it?


9 posted on 01/29/2014 1:37:23 PM PST by BenLurkin (This is not a statement of fact. It is either opinion or satire; or both.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

This appears to be a generic proof of concept example that’s been around for a couple of years designed to run on all three platforms. . . and requires a means of getting it onto each of them. A Trojan horse might do it. . . but requires the participation of a user with administrative access.


12 posted on 01/29/2014 8:06:22 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

interesting


13 posted on 01/29/2014 8:54:06 PM PST by Democrat_media (Obama ordered IRS to rig 2012 election and must resign)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson