Forgot your password?
typodupeerror
Security Windows Wine Linux

Now Linux Can Get Viruses, Via Wine 343

Posted by timothy
from the many-humans-do-the-same dept.
fsufitch writes "Wine has advanced enough to make Linux not immune to Windows viruses. However, just like many Wine applications, it takes a bit of effort to get the program off the ground. Also, just like some Windows programs running via Wine, not all features may work — in this case, the crippling of the system, immunity to the task manager, identity theft, etc."
This discussion has been archived. No new comments can be posted.

Now Linux Can Get Viruses, Via Wine

Comments Filter:
  • It's like a what? (Score:4, Interesting)

    by cjfs (1253208) on Saturday October 24, 2009 @02:40PM (#29858471) Homepage Journal

    A virus run in Wine is akin to taking a ferocious tiger out of the jungle, paralyzing it, then hooking up all of its nerve endings to virtual jungle simulator. It's not a perfect simulation, though, so the jungle maybe doesn't look right, and plus there's an omnipotent power that can change anything that goes on in the simulation, or even destroy it and the tiger's consciousness with a few twitches of his fingers. Now that's power.

    Power that's generated by feeding the dead tigers back to other tigers so we can use their body heat to generate MORE POWER!

    On second thought, lets stick to car analogies.

  • Linux? (Score:2, Interesting)

    by niko9 (315647) on Saturday October 24, 2009 @02:51PM (#29858573)

    Preface: I'm Debian GNU/Linux user of 10 years, but not a professional computer geek. I use GNU/Linux to get work done.

    I thought Linux was just a kernel? Should not the headline read "A Linux distribution that has Wine installed *might* be vulnerable to Windows viruses?"

  • by Ilgaz (86384) on Saturday October 24, 2009 @02:54PM (#29858597) Homepage

    If you look deeper to Apple users virtual machines (Sun Virtual Box etc.) , lots of them doesn't bother to install some free AV, a basic one saying "it is virtual anyway". When you talk about how evil things can be done while their virtual machine up and what kind of trouble they may get into if they have bad luck, they install a free AV to Windows.

    If you have trouble convincing such people, just use plain logic: It can even run some games let alone a worm/trojan/virus.

    It is not in the culture you know...

  • Re:marketshare (Score:1, Interesting)

    by Anonymous Coward on Saturday October 24, 2009 @02:57PM (#29858625)

    But for that matter, Linux doesn't have malware only because it's desktop share is next to nothing

    Then why do linux server not have viruses? Windows servers do, and Linux has a much bigger market share.

  • by Anonymous Coward on Saturday October 24, 2009 @03:02PM (#29858665)

    certified quite literally the repositories for most distros use package signing of some sort, so even mirrors of them are guaranteed to be unaltered.

  • by Savior_on_a_Stick (971781) <robertfranz@gmail.com> on Saturday October 24, 2009 @03:12PM (#29858721)

    Users with Office installed seem to end up documents infected with a macro virus.

    While the Macs are themselves unaffected, they pass along the infection to windows boxes.

    That's usually the point where they are found and removed, but the general lack of av for Mac (few choices and most lack functionality/accuracy) along with the perception of macs as immune means that av is rarely installed on macs.

    When it is, AV_App_X doesn't detect the malware, whereas AV_App_Y detects, but can't clean, and AV_App_Z has no realtime scanning.

  • not just marketshare (Score:5, Interesting)

    by RiotingPacifist (1228016) on Saturday October 24, 2009 @03:22PM (#29858799)

    Ubuntu 9.10 will start sandboxing desktop programs (starts with xpdf i think), other distros do already/will follow. I think that sandboxing can (and if required will) criple malwares abilities (e.g can't listen on network ports, can't insert itself to bootsequence, can't touch chrome tabs that are connected to https sites) leaving them unable to do most malwarey things without permission and can work like an AV that is designed right (e.g warn users that they are about to do something very stupid, only when they are not everytime they run a 3rd party app/widget, without having to scan binaries)

  • Re:marketshare (Score:3, Interesting)

    by cenc (1310167) on Saturday October 24, 2009 @04:05PM (#29859149) Homepage

    I have been running linux machines for going on 10 years now, including my home, all the computers in my office, dozens of servers with every imaginable piece of software and configuration possible (some secure some insecure) in that time, I as yet to ever find one virus, malware, or evidence that a serious attempt was ever made any progress.

    The market share argument just does not cut it. You would think there would be at least one well know case in the wild by now of a linux virus spreading to other linux machines in a sustained and ongoing manner.

    The best we have are 'just so' cases. The software, permissions, user, network, and so on had to be just so in order for virus or malware to work. But a general widespread linux virus? Where are they?

  • Re:marketshare (Score:3, Interesting)

    by dontmakemethink (1186169) on Saturday October 24, 2009 @04:28PM (#29859339)

    Think of it from a the perspective of the imps making the viruses (and no, it's not 'virii'). Pretend you're a spineless asshole that wants to cause as much damage as possible. Do you use widespread tools to make a Windows virus with relative ease and hit the biggest user base, or do you spend much more time finding vulerabilities in better OS's and hit a much smaller user base?

    99 times out of 100 it's the former scenario that plays out. Doesn't mean you needn't run anti-virus software on OS X, for example, but you can have much more confidence that nothing will get past it. Running XP doesn't scare me, it's the number of viruses that Avast catches that scares me.

  • Re:marketshare (Score:2, Interesting)

    by zigmeister (1281432) on Saturday October 24, 2009 @04:34PM (#29859377)
    I mostly agree. However Linux (and Mac) are much more immune to what are strictly viruses. What they are not much more immune to are trojans*, which I think constitute ~80-90% of infected Windows desktops. Here's my theory to dispel the myth of how robust Linux is(when in the hands of a typical user): Write a malware program that is a variant on the dancing bunnies. Put it up for download. User must have dancing bunnies or else. User clicks to download, then selects Open with Package Manager. User enters root password to install then since security signature is missing must enter it again. Malware program now installed.

    *I'm aware of least privilege. However with more and more of the total desktop market being in the home, most users will have their root passwords (i.e. not in a corporate environment) and see no difference between entering that and clicking continue on a bunch of UAC prompts. To make matters worse they will be conditioned to "Force install" since a decent amount of apps that are safe that they want don't provide security signatures either. E.G.: World of Goo, Hulu Desktop Client, commercial games if they ever come etc.
  • Re:marketshare (Score:2, Interesting)

    by Stupendoussteve (891822) on Saturday October 24, 2009 @04:36PM (#29859403)

    OS X Snow Leopard notices the two trojans which are in the wild.

    They didn't do anything extreme, and they were installed by stupid users pirating software, but they do exist.

  • Re:Experiments (Score:2, Interesting)

    by Kenz0r (900338) on Saturday October 24, 2009 @05:27PM (#29859865) Homepage
    I'm a linux noob, but wouldn't using SELinux eliminate the entire problem?
    Only give the files and folders you want Wine to access the corresponding SELinux context and nothing Wine does can hurt the rest of the system.
  • Re:marketshare (Score:3, Interesting)

    by MichaelSmith (789609) on Saturday October 24, 2009 @05:31PM (#29859901) Homepage Journal

    My wife runs ubuntu on her laptop. He is away in Malaysia at the moment taking care of family business and she needed to get online. So she goes to this internet cafe and they give her a CAT5 cable which she plugs in. I have set her up with a VPN so comms are secure. She thinks something is wrong so she asks for help. The internet cafe people start stuffing around with network interfaces and she types her password in for them. So now all I know is that she gave these people root access when she had no idea what was going on.

    She is a non-technical person and she will do the stupidest things, regardless of the OS she runs.

  • Somewhat (Score:0, Interesting)

    by HomelessInLaJolla (1026842) <lajollahomeless@hotmail.com> on Saturday October 24, 2009 @06:01PM (#29860119) Homepage Journal

    There are multiplatform viruses but not in the way that is immediately obvious. Any particular virus would be much too large if it included all of the code necessary to first determine which set of appropriate function calls are available, where they are located, and then behave accordingly.

    So fork it.

    The conceptual function of a virus has expanded. The same dirty webmaster who is using IE exploits to turn visitors into part-time as needed distributed computing zombies is also using firefox/iceweasel/moz exploits, and opera exploits, and maybe even lynx/links and whatever other exploits. It is much easier for that sort of determination and selection to be made from the server side than in the actual viral packet itself.

    The same dirty webmaster who is infecting visitors to become part-time as needed distributed computing zombies is sharing his database with his associate webmasters. Those webmasters likely have associates who work in ISPs with varying levels of access to information. Just imagine the database of online browsing habits linked with personal information that a group of webmasters... say Slashdot, Gmail, SF.net, and MSN... could compile, completely legally within EULA terms.

    Identity theft isn't just for the CIA and some maladjusted kid living in mom's basement. It's part of the corporate profit margin.

    So yes. The overall function of the system of computer exploitation has long been free of platform dependency. Now add in java.

  • by RiotingPacifist (1228016) on Saturday October 24, 2009 @06:35PM (#29860379)

    To an extent yes, (seriously mods, moding funny because you disagree?), however AFAIK IEs implementation is in IE not at system level, so it cannot be applied to anything but IE & plugins. OFC this isn't to say that it can't rigorous sandboxing can't be implemented in windows, just that the tech is already in Linux, it just needs the configuration and UI to move it to the dekstop, IMO this would come if there was demand.

  • by coryking (104614) * on Saturday October 24, 2009 @07:17PM (#29860639) Homepage Journal

    however AFAIK IEs implementation is in IE not at system level

    You would be incorrect [microsoft.com]. IE uses an OS level service known as Windows Integrity Mechanism [microsoft.com]. Same mechanism used by UAC or Silverlight.

  • Re:marketshare (Score:3, Interesting)

    by fluffy99 (870997) on Saturday October 24, 2009 @09:25PM (#29861299)

    Just having SELinux install and enforcing is useless, unless someone has gone through and written proper policies that define the mandatory-access-control limitations. Policies have been written for many service such as Apache, but there is still a dearth of appropriate policies for user apps.

  • by the_womble (580291) on Sunday October 25, 2009 @12:44AM (#29862291) Homepage Journal

    A hijacker would also have to forge signatures.

    The other is a problem, but:

    1) It tends to be obscure stuff than only slightly geeky users want (i..e. the sort of people who know how to check things)
    2) It often comes with some way of checking (e.g. checksums) that you get the real download.
    3) A user who has downloaded one app from an untrusted site is much less likely to have downloaded malware than someone who has downloaded fifty.

  • Re:Experiments (Score:3, Interesting)

    by TheRaven64 (641858) on Monday October 26, 2009 @06:58AM (#29870679) Journal

    Assuming that the user has access t this, yes. If you call open(), then the WINE loader will fix up the address so that you are calling the WINE open() function, rather than the libc one. On Linux, however, open() is a wrapper around system call 5. If you put 5 in eax, a pointer to the filename in ebx, and the correct flags in ecx and edx, then issue interrupt 80h, then you will open the file. WINE doesn't run with any more privileges than the user (unless you've done something stupid, like set the setuid flag on the root-owned wine binary), so it can't access any files that the user can't access, but it can do anything that the user can. If you write a little assembly function that does this (or just copy it from glibc) and then link it into your Windows binary, then you can call it and get back the file descriptor. You'll also need to copy, at a minimum, wrappers around the read and write system calls.

    Note that this kind of sandboxing would be much easier on a microkernel. With something like HURD, open() is serviced by a userspace program that the program communicates with via a Mach port. WINE could trivially run a daemon on such systems and have the loader replace the port reference to the system server with one to this daemon, which could validate things like this to ensure that they remained in the sandbox. Unfortunately, WINE can't use chroot, because it needs to be able to map several different drives. In theory, it could if you only wanted a single C: drive in ~/.wine/drive_c and no other drives (e.g. DVD/network). It might be nice for someone security conscious to create a distribution of WINE that was configured like this for running not-so-trusted Windows programs.

"Indecision is the basis of flexibility" -- button at a Science Fiction convention.

Working...