Exploits Emerge For Linux Privilege Escalation Flaw 176
angry tapir writes "Linux vendors are rushing to patch a privilege escalation vulnerability in the Linux kernel that can be exploited by local attackers to gain root access on the system. The vulnerability, which is identified as CVE-2012-0056, was discovered by Jüri Aedla and is caused by a failure of the Linux kernel to properly restrict access to the '/proc//mem' file."
Hrrm (Score:5, Insightful)
If someone is in a position to run a local exploit, aren't you pretty much fucked anyways?
Re:Hrrm (Score:4, Insightful)
Re:Hrrm (Score:5, Insightful)
Web servers are vulnerable because they run server side code, often uploaded with vulnerable content management systems, etc.
Re:Hrrm (Score:2, Insightful)
Of course. The best local exploit is a screwdriver and a spare moment or two.
Some quick contrarian rules:
Rule #1: There is no such thing as 100% secure. Even 100% bug-free cannot be considered 100% secure. It may work according to the design, and the design can be 100% correct today, but today is not tomorrow.
Rule #2: The more complicated layers of security you add, the more security holes you add. For those into car analogies, security always ends up being bolted on, like bondo dent filler, because you can't anticipate every future accident scenario. Anyone who claims otherwise is either a charlatan, a snake-oil salesman, a liar, or just plain deluded. Those who claim "you can't add security later" are liars. Those who use unix as an example don't know history - unix originally had zero security.
Rule #3: All security is ultimately "security through obscurity." If you believe open is more secure, please post your account info, including cc numbers, banking info, user names and passwords, to help make them "more secure". I'd say just email them to me, but "more eyes" and all that :-)
Beware of ALL blanket statements ;-) (Score:5, Insightful)
You either don't know what the word all means, or you don't know what the term security through obscurity means.
Proof you are 100% wrong per your request (Score:5, Insightful)
Re:Proof you are 100% wrong per your request (Score:5, Insightful)
Turtles all the way down (Score:4, Insightful)
Re:Better than Windoze (Score:5, Insightful)
You seem to be in a situation where PEBKAC - it's corrupting the text of your post. Of course what you meant to say is that the Open Source model does not guarantee security but simply allows interested parties to audit for and fix security problems independent of any single company or other rights holding restricting access to the source. Generally we find that the Open Source model has worked well for Linux and has been effective at addressing security concerns. The question is sometimes not whether problems exist, but whether or not they are found and corrected.
Speaking of security on Windows - if that post of yours isn't a case where PEBKAC, you might want to install some anti virus software - looks like someone might have pwnd your machine.