[mdlug] Linux root exploit

Joseph C. Bender jcbender at bendorius.com
Mon Feb 11 08:50:37 EST 2008


Clinton V. Weiss wrote:

> I fully agree that this vulnerability is a big deal.  But the exploiter has
> to do a couple of things first:
> 
> 1) Circumvent physical security measures and have local access to your
> machine, and be able to log in to the machine.
> 2) Circumvent network security measures and be able to log into your machine
> remotely.
> 
	There's also a #3 here (and more, but the coffee hasn't kicked in yet, 
and they're variations anyway).  This is in the form of a vulnerable 
public applications vector, which can and should be labeled as a 
distinct category from #2, in that network security measures at the 
layer 2 and layer 3 level won't do anything to protect.

	A good example is a public facing webserver that *might* be pretty well 
locked down, running as a non-priv'd user.  It does, however, have one 
little vulnerable script or executable that allows for the execution of 
code as the local user, which, in and of itself might be a trival 
exploit with very few actual issues, but combine it with a privilege 
escalation local exploit, get that code to run from that vulnerable 
script, and hey presto, that little issue just got really nasty.

	There's a couple of other nasty variations on this theme, including 
tricking a legit user to execute the "local" exploit code via an email 
attachment, URL, or some other "legitimate" vector(the MS ILOVEYOU virus 
is a good example of this).

	I'm not obviously sure what you mean by "network security measures" for 
#2, but a lot of people treat that as "firewall/NAT/layer-2/layer-3". 
To address everything through layer 7, a good IDS/IPS solution can and 
should be integrated internally and externally on the network and the 
attack signature updates done on a consistent and frequent basis, with 
updates monitored for what they're now checking for.

	For those reasons and a bunch of others, I really hate when a exploit 
gets classified as "local" vs. "remote" and the local attack isn't 
always seen as seriously as the remote exploit (I'm NOT saying however, 
that you're thinking this or seeing it that way).  Attack vector 
analysis is complex enough on any network with more than a few devices 
and operating systems on it that you can't always see how code might end 
up getting executed locally on a box.



-- 
Joseph Bender
Bendorius Consulting
P: 248-434-5580
F: 248-434-5581
jcbender at bendorius com



More information about the mdlug mailing list