LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-09-2010, 07:36 AM   #1
penguinquack
LQ Newbie
 
Registered: Dec 2010
Posts: 9

Rep: Reputation: 0
why doesnt linux have antivirus/detection for java exploits and other flaws?


Recently I had a Java exploit on Windows. Luckily Microsoft Security Essentials identified and removed it. Such things can happen on Linux as well, from what I've heard. Why does Linux offer no such detection?
 
Click here to see the post LQ members have rated as the most helpful post in this thread.
Old 12-09-2010, 03:19 PM   #2
smoker
Senior Member
 
Registered: Oct 2004
Distribution: Fedora Core 4, 12, 13, 14, 15, 17
Posts: 2,279

Rep: Reputation: 250Reputation: 250Reputation: 250
Such things can happen on linux. But try googling for actual occurences.
 
Old 12-09-2010, 04:21 PM   #3
penguinquack
LQ Newbie
 
Registered: Dec 2010
Posts: 9

Original Poster
Rep: Reputation: 0
They are all over. There is a stickie with "Firefox vulnerabilities" in this section, and if you Google this subject you can get many examples. Here is just one that pertains directly to what I'm talking about http://www.linux-tutorial.info/modul...icle&sid=11229

Also, how is one to know about a java exploit without any software that would alert the person to it?

Last edited by penguinquack; 12-09-2010 at 04:35 PM.
 
Old 12-09-2010, 06:23 PM   #4
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
There's several virus scanners available for GNU/Linux. Have you run the malicious code through any of these scanners to see if it's detected? It might be interesting to see the results of such experiments, if you're able and willing to share with us.

That said, keep in mind that if you're running software with publicly-known vulnerabilities in it, your best bet is to follow the manufacturer's (or the expert community's) recommended mitigation steps immediately, rather than waiting for some third-party tool to update its signature database and save you if you're lucky enough to get hit with an exploit it recognizes.

Last edited by win32sux; 12-09-2010 at 06:25 PM.
 
1 members found this post helpful.
Old 12-09-2010, 06:26 PM   #5
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
One of the biggest differences between most Windows installations and most linux installations is difference in administrator privilege. The Windows concept of administrator is such that the primary account by default is an administrator account. Additionally, as has been demonstrated on several past occasions, Windows fails at encapsulating the OS kernel from user applications. Consequently, if malware is able to get ANY code to run, including java code or an Office macro, it is possible to completely hijack control of the OS itself. Consequently an infection can wreak a lot more damage than it can in a Linux system. Typically such an infection on a Linux system would be limited in its scope to the user's account and would be unable to acquire access to most critical resources.

Add to this that the average Linux user is more technically sophisticated than the average Windows user and hence is likely more aware of the signs of infection, more likely to avoid infections in the first place, and more likely to know how to deal with it effectively in the first place.

In essence, the issue isn't so much as Linux is immune to such exploits, it is that they are far less likely to spread and cause significant damaging.
 
Old 12-09-2010, 06:55 PM   #6
penguinquack
LQ Newbie
 
Registered: Dec 2010
Posts: 9

Original Poster
Rep: Reputation: 0
Thank you noway2 and win32sux.

win32sux: the exploit that I experienced personally was on Windows, not Linux. The link in my 2nd post is to give an example of exploits that exist for Linux. Also I'm focusing more on exploits, in particular java and browser exploits.

Noway2: Thank you that was informative. My biggest remaining problem with this whole concept is that windows would be able to spot a java exploit quicker than Linux, even though more damage may be caused in windows. However, as you seem to suggest, this may be less severe with Linux distros that have regular security updates, and will be patched before the exploit can occur. Is this a good assumption?

edit--- sorry that was win32sux that suggested that last bit.

Last edited by penguinquack; 12-09-2010 at 06:58 PM.
 
Old 12-09-2010, 07:08 PM   #7
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
There is one other aspect effecting the majority of Linux installations that I forgot to mention and that I think helps to address your last question. In Linux, the vast majority of the installed software comes from designated repositories where the software has been examined by a team of people as well as cryptographically 'signed'. As a result, the need to install various applications from unknown sources is dramatically reduced. The net effect is that as long as one installs software only from the known repositories that the chance of acquiring 'infected' code is near negligible because the code base is more tightly controlled and its authenticity is verified before it is installed (the signing). Furthermore, in order to install such software, the user must knowingly grant privilege to do so making it much harder to slip something in on the sly.
 
2 members found this post helpful.
Old 12-09-2010, 07:12 PM   #8
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by penguinquack View Post
win32sux: the exploit that I experienced personally was on Windows, not Linux.
Yes, I know.

Quote:
The link in my 2nd post is to give an example of exploits that exist for Linux. Also I'm focusing more on exploits, in particular java and browser exploits.
I understand that, but virus scanners will typically look for more than just viruses. I know that ClamAV, for example, has exploit signatures in its database, some of which are browser exploits which work (or have worked) on GNU/Linux.

Quote:
Noway2: Thank you that was informative. My biggest remaining problem with this whole concept is that windows would be able to spot a java exploit quicker than Linux, even though more damage may be caused in windows. However, as you seem to suggest, this may be less severe with Linux distros that have regular security updates, and will be patched before the exploit can occur. Is this a good assumption?
That's a terrible assumption, IMHO.

There's really no guarantees that you won't be exploited before a patch has been released. In fact, there's no guarantees that you won't be exploited before a patch has even been created (or worse, before the manufacturer even suspects the vulnerability exists). Reducing your attack surface and implementing multiple layers of security will do much more for you on any OS than simply using GNU/Linux ever would.

Last edited by win32sux; 12-09-2010 at 07:18 PM.
 
2 members found this post helpful.
Old 12-11-2010, 12:02 PM   #9
penguinquack
LQ Newbie
 
Registered: Dec 2010
Posts: 9

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by Noway2 View Post
There is one other aspect effecting the majority of Linux installations that I forgot to mention and that I think helps to address your last question. In Linux, the vast majority of the installed software comes from designated repositories where the software has been examined by a team of people as well as cryptographically 'signed'. As a result, the need to install various applications from unknown sources is dramatically reduced. The net effect is that as long as one installs software only from the known repositories that the chance of acquiring 'infected' code is near negligible because the code base is more tightly controlled and its authenticity is verified before it is installed (the signing). Furthermore, in order to install such software, the user must knowingly grant privilege to do so making it much harder to slip something in on the sly.
Thank you Noway2 and everyone else. This may sound like a silly question but, is a software package that is older and more "controlled" more safe than a software package that is newer and may therefore have less bugs?
 
Old 12-11-2010, 12:13 PM   #10
frieza
Senior Member
 
Registered: Feb 2002
Location: harvard, il
Distribution: Ubuntu 11.4,DD-WRT micro plus ssh,lfs-6.6,Fedora 15,Fedora 16
Posts: 3,233

Rep: Reputation: 406Reputation: 406Reputation: 406Reputation: 406Reputation: 406
Quote:
Originally Posted by penguinquack View Post
Thank you Noway2 and everyone else. This may sound like a silly question but, is a software package that is older and more "controlled" more safe than a software package that is newer and may therefore have less bugs?
depends, take the php CMS script drupal for instance, currently there is version 5.x, version 6.x and a beta of version 7.x

despite the fact that 6.x has been out for a while and a beta of 7.x, version, 5.x still recieves minor revisions (no new features just security/bug fixes)

another example would be the linux kernel itself, there is still maintenance being done on the 2.4 kernel despite the fact that the 2.6 kernel is up to minor revision 37

so ultimately it depends on the package, whether older versions are still maintained with minor revisions or not and how well maintained they are, since otherwise older versions will have known exploits and will take less effort to crack since the exploits are already known, either way as long as you stay away from the most bleeding edge versions with potentially incomplete features, any revision marked 'stable' should be adequately secure, that being said no software is 100% secure

Last edited by frieza; 12-11-2010 at 12:19 PM.
 
Old 12-12-2010, 01:13 AM   #11
darkstarbyte
Member
 
Registered: May 2010
Location: 3 planets away from the sun.
Distribution: Slackware and Fedora
Posts: 234

Rep: Reputation: 2
Cool

I didn't read every post.

If you want to stop these java exploits, there is an add-on for firefox for it, called "no script" that is supposed to stop every script, but the ones you enable.
 
Old 12-12-2010, 04:08 AM   #12
smoker
Senior Member
 
Registered: Oct 2004
Distribution: Fedora Core 4, 12, 13, 14, 15, 17
Posts: 2,279

Rep: Reputation: 250Reputation: 250Reputation: 250
Quote:
Originally Posted by darkstarbyte View Post
I didn't read every post.

If you want to stop these java exploits, there is an add-on for firefox for it, called "no script" that is supposed to stop every script, but the ones you enable.
I think that is for javascript, not Java. They are different things.

And after reading the link the OP posted, there was no specific threat mentioned, only that it may be possible.

I also read the sticky thread and could find no mention of Java exploits either in the first 5 pages or the last 3 pages.

Do you realise that java and javascript are completely different things ?

Last edited by smoker; 12-12-2010 at 04:17 AM.
 
Old 12-12-2010, 07:34 AM   #13
penguinquack
LQ Newbie
 
Registered: Dec 2010
Posts: 9

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by smoker View Post
I think that is for javascript, not Java. They are different things.

And after reading the link the OP posted, there was no specific threat mentioned, only that it may be possible.

I also read the sticky thread and could find no mention of Java exploits either in the first 5 pages or the last 3 pages.

Do you realise that java and javascript are completely different things ?
Maybe I'm confused too. I thought Java was a subtype of Javascript. A quick Google scan-over reveals that the two have a close relationship, though I had trouble making sense of just what that relationship was, so I'll be doing more reading (hopefully). Also, the addon he mentioned also blocks Java, optionally.

The reason I mentioned "it may be possible" is because, if there is no reliable software to check for such things, I thought it could be a threat that no one would see if they became infected. However, it now appears to me that there is some anti-virus and anti-rootkit software that *may* be able to identify these things.

Thanks for your replies everyone.
 
Old 12-12-2010, 07:37 AM   #14
penguinquack
LQ Newbie
 
Registered: Dec 2010
Posts: 9

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by frieza View Post
depends, take the php CMS script drupal for instance, currently there is version 5.x, version 6.x and a beta of version 7.x

despite the fact that 6.x has been out for a while and a beta of 7.x, version, 5.x still recieves minor revisions (no new features just security/bug fixes)

another example would be the linux kernel itself, there is still maintenance being done on the 2.4 kernel despite the fact that the 2.6 kernel is up to minor revision 37

so ultimately it depends on the package, whether older versions are still maintained with minor revisions or not and how well maintained they are, since otherwise older versions will have known exploits and will take less effort to crack since the exploits are already known, either way as long as you stay away from the most bleeding edge versions with potentially incomplete features, any revision marked 'stable' should be adequately secure, that being said no software is 100% secure
Thanks for your reply.

What is the purpose of these repositories with software several years old (for example, in Ubuntu) if any stable software is going to be as secure?
 
Old 12-12-2010, 08:00 AM   #15
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
Quote:
Originally Posted by penguinquack View Post
Maybe I'm confused too. I thought Java was a subtype of Javascript. A quick Google scan-over reveals that the two have a close relationship, though I had trouble making sense of just what that relationship was, so I'll be doing more reading (hopefully). Also, the addon he mentioned also blocks Java, optionally.
Actually Java and Javascript have nothing to do with each other beyond the fact that both are used in web-based applications. Their roots as programming languages are light-years apart. This is a nice comparison.

Quote:
What is the purpose of these repositories with software several years old (for example, in Ubuntu) if any stable software is going to be as secure?
At least in my opinion, keeping older software stems from a "if it ain't broke" philosophy. A lot of people (me included) tend to view new stuff as untested and would prefer to rely on software that has been through the mill for a bit rather than jump on the latest stuff which may have undiscovered problems. Stable != secure in all cases. As long as the older stuff does what you need it to do and is maintained and patched, why switch?
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Antivirus survey: Do you run an antivirus program on linux? atom Linux - General 29 09-03-2009 03:22 PM
LXer: Sun patches multiple flaws in Java LXer Syndicated Linux News 0 10-05-2007 12:20 PM
firewall with antivirus and spam detection zamri Linux - Security 7 10-06-2006 11:43 PM
No sound in FC3 (soundcard detection doesnt work) BBB Linux - Hardware 1 11-16-2004 11:55 AM
linux exploits? rjcrews Linux - Security 3 09-10-2004 02:20 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:46 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration