Skip to comments.
Flaw in Linux kernel allows attack
CNETAsia ^
| December 2 2003
| Robert Lemos
Posted on 12/01/2003 8:10:29 PM PST by yonif
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-80 ... 141-147 next last
To: Golden Eagle
Windows and Linux are victims of their own success, in the sense that they are popular targets for computer crackers.
I wouldn't call Linux 'behind the times' since it has had the ability to act as a personal firewall for a long time. In my opinion the developer's workstation was improperly configured, such as having services visible to the outside world and firewalling turned off. But yes, it could have been avoided.
41
posted on
12/02/2003 11:40:19 AM PST
by
Liberal Classic
(No better friend, no worse enemy.)
To: Dominic Harr
Then why do MS-only sorts feel the need to 'ankle-bite' like this?
Look in the mirror, pal. You've made it very clear that you hold a grudge against M$ -- and your posts only confirm that.
42
posted on
12/02/2003 11:42:26 AM PST
by
Bush2000
To: Bush2000
So what? Can't have an opinion? You don't have a *cough* grudge *cough* against Linux? ;)
43
posted on
12/02/2003 11:46:31 AM PST
by
Liberal Classic
(No better friend, no worse enemy.)
To: Liberal Classic
So what? Can't have an opinion? You don't have a *cough* grudge *cough* against Linux? ;)
Actually, no, I don't have a grudge against Linux. I have a Redhat box at home that I use on occasion, and I boot Knoppix (nice) whenever I need a quick-and-dirty Linux installation.
James Turner of Linux World magazine
summed up my feelings perfectly about the OSS community:
"To sum up, the biggest problem that the Open Source community faces in taking Open Source to the next level is not some legal challenge or Microsoft marketing campaign. Its the immaturity and insecurity of some of the members of the community. As was once said in Pogo, We have met the enemy, and he is us.
They can't merely coexist with the Windows community. They have a rabid need to constantly tear it down. And I'm merely providing much-needed balance.
44
posted on
12/02/2003 11:57:20 AM PST
by
Bush2000
To: Liberal Classic
Still not a lot of technical information, but this is a general audience article. That seems to be all that is available about the hack, even the official debian responses have been limited.
First, a developer's workstation was compromised...
Even how this happened hasn't been disclosed yet, has it?
the article states a memory management bug was used...
Which is probably why system was limping bad enough the admins noticed.
if you can find a package that the kernel depends on it may be possible to get super-user privilage
Which is of course exactly why kernel hacks are the worst, you have full access to all i/o ports and internal calls.
It's a shame that someone with skills enough to root several systems of seemingly high importance doesn't have a good job to keep them busy instead. But if all programmers become open source out-of-jobbies, this problem may grow.
To: Liberal Classic
In my opinion the developer's workstation was improperly configured, such as having services visible to the outside world and firewalling turned off. Absolutely right, especially on a project of such high visibility. The bottom line with hackers is simple - you can never underestimate them or the angle they might take. So you have do whatever you can to stop them. Nontheless, ultimately the hackers are always the ones responsible for these incidents, and are IMO the equivalency of rodents.
To: rdb3; TechJunkYard; chance33_98; Calvinist_Dark_Lord; Dominic Harr; Bush2000; Nick Danger; ...
Tech Ping
Apologies to those already on this thread.
47
posted on
12/02/2003 12:26:39 PM PST
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: Bush2000
Okay, okay. You have a grudge against Harr, then. :P
48
posted on
12/02/2003 12:27:50 PM PST
by
Liberal Classic
(No better friend, no worse enemy.)
To: Golden Eagle
You're right that the article doesn't go into detail because Debian hasn't released too many yet. I don't have any inside information and I'm just speculating but I bet money, marbles, and chalk the developer's workstation was the weak link.
Here's some more links:
Infoworld: Bug affects versions of Linux kernel prior to 2.4.23
They say this bug was fixed in September.
SearchEnterpriseLinux.com
The flaw, an integer overflow in the "brk" system call, enabled an attacker to compromise four Debian servers, sniff several passwords and install a root kit used to hit other servers.
Sniffed password used for Debian server compromise
"Somehow they got root on klecker and installed suckit. The same account was then used to log into master and gain root and install suckit there too. They then tried to get to murphy (which runs the mailing lists) with the same account. This failed because murphy is a restricted box that only a small subset of developers can log into," Troup said. "They then used their root access on master to access an administrative account used for backup purposes and used that to gain access to murphy. They got root on murphy and installed suckit there too. The next day they used a password sniffed on master to login into gluck, got root there and installed suckit."
theregister.co.uk
An encrypted program (encrypted using the TESO BurnEye obfuscator) used an overflow in brk() which allowed the user process to get executable access to kernel space. It's a local exploit, which was only possible because a hacker used a stolen password, then escalated the privileges. All passwords on one of the development machines were invalidated.
49
posted on
12/02/2003 12:32:44 PM PST
by
Liberal Classic
(No better friend, no worse enemy.)
To: Bush2000
Indeed, FR is one of the few places online Linux can even be rationally discussed. Here's an interesting article about how "emotional charged" the recent SCO/IBM courtcase has become, and needless to say who is more fanatical about their choice of operating system.
http://www.internetnews.com/bus-news/article.php/3114961
To: Golden Eagle
To: ThinkPlease
Or you can download the Red Hat patches, which came out about 12 hours after release of the issue. So was this the last and only remaining security hole in Linux?
Yes or No?
52
posted on
12/02/2003 12:46:19 PM PST
by
js1138
To: Liberal Classic
Good investigative work. Looks like their intrusion detection software may have helped alert them of the problem, unfortunately not many have that level of protection so you have to wonder who or what else might have already been hacked, or if other co-ordinated attacks took place elsewhere simultaneously.
You never can overestimate hackers, who they are and what their intentions are.
To: dwollmann
mi2g, the source of this "study" has no credibility, more here, and here.
Yet more evidence that the OSS community has a lot of growing up to do. Don't bother to adddress the complaints: Shoot the messenger.
54
posted on
12/02/2003 12:51:44 PM PST
by
Bush2000
To: Bush2000
They [The Open Source community -LC]
can't merely coexist with the Windows community. They have a rabid need to constantly tear it down. There are some extremists, sure. I make no apologies for Stallman and personally think he's an ass, but it is wrong to paint everybody as a Stallman.
And I'm merely providing much-needed balance.
You forgot the smiley on that. :)
55
posted on
12/02/2003 1:01:09 PM PST
by
Liberal Classic
(No better friend, no worse enemy.)
To: Golden Eagle
Also they're servers started going "oops" or having kernel panics, which was unusual. They shouldn't be waiting for system problems, but then again we don't live in a perfect world. Something tells me they will be examining their tripwide emails more regularly from now on.
56
posted on
12/02/2003 1:05:40 PM PST
by
Liberal Classic
(No better friend, no worse enemy.)
To: dwollmann
Maybe, but that first link of yours is to attrition.org, one of the most well known hacker hangouts in existence, I would STRONGLY recommend freepers not surf there.
But for those that are willing, here is a sample of what they will find, such as this commentary peice entitled "The Bush News Network" posted as 'news':
http://www.attrition.org/news/
To: Bush2000
If you can't compile, you should learn how before you use Linux. It's not really that hard, certainly not any more difficult than making MS OE secure from worms.
To: Golden Eagle
For the record, there is no fear of linux by the well established. Forgive me if I take that with a grain of salt, considering pretty much your entire career here at FR has been as an anti-Linux advocate.
I'm not even a 'Linux' type. I'm a Java developer, I'm OS agnostic. I like linux for dev use and servers only.
But your high-publicity campaign against Linux here just *screams* fear. As do the 'ankle-biting' responses of those taking glee at a minor slip by a relatively highly secure OS.
To: krinklyfig
If you can't compile, you should learn how before you use Linux. It's not really that hard, certainly not any more difficult than making MS OE secure from worms. Ah. The OS for the rest of us.
60
posted on
12/02/2003 1:53:24 PM PST
by
js1138
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-80 ... 141-147 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson