|
|
Subscribe / Log in / New account

Security

What happened to the other 8%

As reported last week, Evans Data recently announced the results of a survey which indicated (among other things) that 92% of their respondents have never suffered a virus infection on their Linux systems. The mainstream press made a big deal out of this result, but, to most Linux users, the interesting result was the 8%. Linux systems can have security problems, but virus problems, in particular, are almost unheard of. An 8% infection rate seemed too high.

We dropped the folks at Evans Data a note asking for some more information. The result came back from none other than Nick Petreley, who is now the "Linux analyst" for Evans. He says:

The vast majority of Linux developers, 92%, have never experienced a virus infection on Linux. We know of no known viruses to which Linux is currently susceptible, so the tiny percentage of respondents who claim to have experienced virus infections on Linux servers may be referring to an historical incident. Although the survey question does not account for this, it is also possible that some respondents are referring to situations where they are using Linux servers to filter viruses for Windows clients. In this case, the viral infection may actually have taken place on a Windows machine because the virus checker on the Linux server failed to catch it

In other words, they don't really know either. The survey was performed over the web (a private page accessible by invitation only) and didn't really provide for detailed answers.

Comments (4 posted)

Fun with RFID tags

The various privacy implications of widespread use of radio-frequency identification tags have been widely discussed. This eWeek article, reporting on a Black Hat Briefings session, brings up a new issue. It seems that the portion of most RFID tags which holds the product code is rewritable. Anybody who can haul a suitably equipped system into a store can rewrite the tags at will, creating no end of opportunities for confusion and theft.

According to the article, things go even further than that:

And there's an even worse scenario: "It is only a matter of time before someone puts a root exploit on one of these tags and hacks into your supply chain," Grunwald said.

That scenario seems unlikely; the capacity of an RFID tag, and the uses to which the tags are put, do not afford many opportunities for the injection of shell code into point-of-sale systems. But, then, somebody might just pull it off.

The real security risk is the number of systems which will be programmed to believe what their RFID readers are telling them. It is surprising that a device meant to be used as an identification token is rewritable in this way. It should not take too long before troublemakers with RFID writers convince the retail establishment that this was a bad decision.

Comments (2 posted)

Surge in Scans Seeking SSL Servers (Netcraft)

Netcraft reports that Internet scanning for servers running Secure Sockets Layer (SSL) has spiked in the past week. "Security firms are advising network administrators to install security patches for SSL servers, including a recent update for mod_ssl, which is widely used in Apache servers running OpenSSL. A security update was released July 16 to fix the vulnerability, which may allow a remote attacker to execute arbitrary code when Apache is configured to use mod_ssl and mod_proxy, according to an advisory from Gentoo Linux."

Comments (2 posted)

New vulnerabilities

gnome-vfs: backend script vulnerabilities

Package(s):gnome-vfs CVE #(s):CAN-2004-0494
Created:August 4, 2004 Updated:February 21, 2005
Description: Several scripts packaged with gnome-vfs, using its "extfs" capability, have security flaws. These scripts tend not to be used on many systems, but their presence can still be a threat.
Alerts:
Fedora-Legacy FLSA:1944 gnome vfs 2005-02-20
Whitebox WBSA-2004:373-01 GNOME VFS 2004-08-19
Red Hat RHSA-2004:373-01 gnome-vfs 2004-08-04

Comments (none posted)

kernel information leak

Package(s):kernel CVE #(s):CAN-2004-0415
Created:August 3, 2004 Updated:October 26, 2004
Description: Paul Starzetz discovered flaws in the Linux kernel when handling file offset pointers. These consist of invalid conversions of 64 to 32-bit file offset pointers and possible race conditions. A local unprivileged user could make use of these flaws to access large portions of kernel memory. Note that this vulnerability affects all 2.4 kernels through 2.4.26 and 2.6 kernels through 2.6.7.

A fix for this problem was added to the fifth 2.4.27 release candidate.

Alerts:
Conectiva CLA-2004:879 kernel 2004-10-26
Fedora-Legacy FLSA:1804 kernel 2004-10-18
Mandrake MDKSA-2004:087 kernel 2004-08-26
Gentoo 200408-24 kernel 2004-08-25
Whitebox WBSA-2004:413-01 kernel 2004-08-19
Red Hat RHSA-2004:327-01 kernel (Itanium) 2004-08-18
Fedora FEDORA-2004-251 kernel 2004-08-10
Trustix TSLSA-2004-0041 kernel 2004-08-09
SuSE SUSE-SA:2004:024 kernel 2004-08-09
Red Hat RHSA-2004:413-01 kernel 2004-08-03
Red Hat RHSA-2004:418-01 kernel 2004-08-03
Fedora FEDORA-2004-247 kernel 2004-08-03

Comments (none posted)

libpng: multiple vulnerabilities

Package(s):libpng CVE #(s):CAN-2002-1363 CAN-2004-0597 CAN-2004-0598 CAN-2004-0599
Created:August 4, 2004 Updated:February 10, 2005
Description: There is yet another set of holes in libpng, versions 1.2.5 and prior, which can be exploited by a malicious image file; see this advisory from Chris Evans or this CERT advisory for details.
Alerts:
Fedora-Legacy FLSA:1943 libpng 2005-02-08
Red Hat RHSA-2004:421-01 mozilla 2004-08-04
Gentoo 200408-22 mozilla 2004-08-23
Whitebox WBSA-2004:402-01 libpng 2004-08-19
Mandrake MDKSA-2004:082 mozilla 2004-08-12
Slackware SSA:2004-223-01 epiphany 2004-08-09
Slackware SSA:2004-223-02 imagemagick 2004-08-07
Slackware SSA:2004-222-01b libpng 2004-08-10
Slackware SSA:2004-222-01 libpng 2004-08-07
Conectiva CLA-2004:856 libpng 2004-08-06
Trustix TSLSA-2004-0040 libpng 2004-08-05
Gentoo 200408-03 libpng 2004-08-05
Debian DSA-536-1 libpng 2004-08-04
Mandrake MDKSA-2004:079 libpng 2004-08-04
SuSE SUSE-SA:2004:023 libpng 2004-08-04
Red Hat RHSA-2004:402-01 libpng 2004-08-04
OpenPKG OpenPKG-SA-2004.035 png 2004-08-04

Comments (1 posted)

phpMyAdmin: remote PHP execution

Package(s):phpmyadmin CVE #(s):
Created:July 29, 2004 Updated:August 4, 2004
Description: phpMyAdmin has a vulnerability that allows a remote attacker to modify variables and execute PHP code. The attacker must have a valid user account.
Alerts:
Gentoo 200407-22 phpmyadmin 2004-07-29

Comments (none posted)

MPlayer: GUI filename handling overflow

Package(s):mplayer CVE #(s):
Created:August 2, 2004 Updated:August 4, 2004
Description: The MPlayer GUI code contains several buffer overflow vulnerabilities, and at least one in the TranslateFilename() function is exploitable. By enticing a user to play a file with a carefully crafted filename an attacker could execute arbitrary code with the permissions of the user running MPlayer.
Alerts:
Gentoo 200408-01 mplayer 2004-08-01

Comments (none posted)

Resources

"Cyber Adversary Characterization: Auditing the Hacker Mind" released

Syngress Publishing has announced the release of Cyber Adversary Characterization: Auditing the Hacker Mind, by Tom Parker, Matthew Devost, Marcus Sachs, Eric Shaw, and Ed Stroz. "By providing recent case studies and profiles of various cyber-terrorists, this is the must-have guide book for understanding the world of hackers."

Full Story (comments: none)

What Countermeasures Really Means (O'ReillyNet)

Here's an O'ReillyNet article looking at the use of active countermeasures in the face of security threats. "One dirty little secret of information security is that corporations have been using 'tiger teams' for years in order to launch highly aggressive counterstrikes against attackers. Why? Because many more corporations get attacked and extorted through computer intrusions than the popular press will ever report."

Comments (1 posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2004, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds