MORE SSH Hacking: heads-up

netmask netmask at enZotech.net
Thu Aug 12 18:36:10 UTC 2004


> You know where this thread is coming from, what the starting point was.
> It is exactly that, that obviously too much Linux admins believe that
> Linux is secure by architecture or what else. It is obvious from my
> investigations too, that the hackers/crackers get access to vulnerable
> Linux hosts as unprivileged users and then using local exploits to
> become root. I know, many Linux admins think local root exploits are
> much less severe than remote root exploits. This is wrong and we now see
> to what it leads, unfortunately.

Remote root is certainly nice.. however these days it is a lot more common to 
gain access remotely via a process with drop'd privs.. You then have to find a 
local exploit to escalate privileges.

Sometimes we get lucky and exploits in PHP come out where the exploit is 
handled before privs are dropped.. and you get root. Other times in apache 
exploits, you end up as the 'nobody' user.

However, I treat local vulnerabilities as serious as remote. While it's 
definitely the smart thing to do to put your processes in jails, and make sure 
they aren't running as root.. It's just not possible to completely not run as 
root while the stack requires root privs to bind ports under 1024, and a few 
other reasons (device access, etc)..  Jails can be broken, etc.

The 'vulnerabilities' I don't worry about it.. are things like the 'info' 
overflow that came out last week on Bugtraq. Is your 'info' binary suid root? 
Do you give people 'sudo info' ?  No.. Do I really care if someone injects 
shellcode into their instance of info and drop to their own privs? not really.

But when you are talking about vulns in su, sudo, etc.. anything that is suid 
on the system (On my server that doesn't run any X.. there is only a need for 
4 suid bins total).

blah blah blah, security if a process..  blah blah, etc etc.

:P





More information about the fedora-list mailing list