People's reaction to this is just stupid.
Posted Nov 19, 2009 20:03 UTC (Thu) by drag
In reply to: People's reaction to this is just stupid.
Parent article: Fedora 12 lets unprivileged users install packages
If a attacker gains access to your local account then they can execute
arbitrary code in your user's account and end up doing pretty much whatever
then wnt. So, yes, if they can (for example) inject a command in your
bashrc script that will command packagekit to install a package. Then if
they find a vulnerable package that installs and automatically
launches a vulnerable service that runs as root then the attacker could use
that to gain root access.
Yes, that is certainly a possibility.
However.... Here is another potential attack.
Imagine your attacking a typical Linux desktop user that has sudo
configured to do things like mounting drives or configuring the network or
updating their software.
Your trying to attack a system like that and you've managed to gain access
to their account through something like a vulnerability in the flash
plugin. All you have to do is just stick a job into the user's account to
run 'if sudo ls > /dev/null; then sudo ~/.run_rootkit;done' every few
seconds or so.
I'd say that over a period of a day or two the user would of certainly done
'sudo ifconfig' or 'sudo apt-get update' or some such thing. Thus giving
the attacker unlimited access to the root account.
Of course attackers would probably just go for the most generic attack and
install a keylogger or something.
Like I said before having a 'admin' password separate from root and the
user password is probably a good idea. Maybe not, I don't know. It would
certainly address most concerns coming from most people.
I think that the current #1 threat to Linux systems is users setting up
OpenSSH access with weak passwords and attackers guessing those passwords
through brute force. Think about that in conjunction with 'sudo'. :)
to post comments)