LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-20-2002, 11:24 AM   #1
jeremy
root
 
Registered: Jun 2000
Distribution: Debian, Red Hat, Slackware, Fedora, Ubuntu
Posts: 13,602

Rep: Reputation: 4083Reputation: 4083Reputation: 4083Reputation: 4083Reputation: 4083Reputation: 4083Reputation: 4083Reputation: 4083Reputation: 4083Reputation: 4083Reputation: 4083
This weeks Security Alerts


In this weeks Security Alerts, we look at a security vulnerability in LIDS; buffer overflows in CUPS, jgroff, Sun Solstice Enterprise Master Agent, and Ettercap; and problems in Sawmill, Faq-O-Matic, pforum, GNAT, Taylor UUCP, and IRIX O2 Video.

http://linux.oreillynet.com/pub/a/li...ecurities.html
 
Old 02-20-2002, 12:38 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
LIDS and alike

..the stuff they're talking about writing to /dev/kmem has been explained quite a while ago by someone called Silvio (author of a few proof of concept Linux viruses, IIRC).

I was trying to assess how vulnerable a box would be when using a GRSecurity patched 2.4 kernel with module loading enabled, and how to somewhat control the damage using Linux Capabilities.
On boot, after loading modules and doing the GRSecurity sysctl stuff, I figured using Lcap to unset the loading of modules (CAP_SYS_MODULE) would be enough. Not, cuz when CAP_SYS_RAWIO isn't disabled they'll be able to write to /dev/kmem.

Doing some further readups also stated writing /dev/kmem as A Clever Way for a cracker to load module code when faced with a kernel w/o module support (when CAP_SYS_RAWIO hasn't been taken away).

* I haven't got a clear view on what would be b0rken when CAP_SYS_RAWIO is taken away tho...
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
This weeks Security Alerts jeremy Linux - Security 0 05-13-2002 07:15 PM
This weeks Security Alerts jeremy Linux - Security 0 12-19-2001 07:46 PM
This weeks Security Alerts jeremy Linux - Security 0 12-12-2001 09:26 PM
This weeks Security Alerts jeremy Linux - Security 0 12-05-2001 01:14 PM
This weeks Security Alerts jeremy Linux - Security 0 11-28-2001 11:00 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:40 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration