Re: [Full-disclosure] Debian Development Machine "Gluck" Hacked - UPDATE

2006-07-13 Thread gboyce

On Thu, 13 Jul 2006, David Taylor wrote:


Curious why Secunia is rating this as 'less critical'.  The way I see it,
this exploit could be integrated into the other exploits for mambo, joomla,
phpbb, etc.  Also, all of us that have websites hosted on linux machines
that have a vulnerable kernel could get root?

I'm thinking 'highly critical'?


Think of their scoring as a minimum rating.  Depending on the particular 
impact to your system, you may need to adjust appropriately.


I would consider this highly critical on any system that would provide 
shell access to customers, non-privledged employees, etc.  If a system has 
shell access restricted to just admins, I'm would care less about this 
vulnerability.  On systems like this I generally assume that if someone 
gets shell to the system as a non-prileged user they will eventually get 
root anyways.


--
Greg

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Debian Development Machine "Gluck" Hacked -UPDATE

2006-07-13 Thread Morning Wood



David Taylor wrote:
Curious why Secunia is rating this as 'less critical'.  The way I see it,
this exploit could be integrated into the other exploits for mambo, 
joomla,

phpbb, etc.  Also, all of us that have websites hosted on linux machines
that have a vulnerable kernel could get root?

I'm thinking 'highly critical'?


considering the widespread use of that kernel,
yes

and yes, viable user=>root exploit can be obtained from a web app vuln. ( 
hacking 101 here kids ) 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Debian Development Machine "Gluck" Hacked - UPDATE

2006-07-13 Thread [EMAIL PROTECTED]




no ... the hacker used a previously hacked developer's account and he
used the fresh kernel bug to escalate to root privilege probably
because he had no access from the developer's account.. 
Read the story on debian.org

David Taylor wrote:

  Curious why Secunia is rating this as 'less critical'.  The way I see it,
this exploit could be integrated into the other exploits for mambo, joomla,
phpbb, etc.  Also, all of us that have websites hosted on linux machines
that have a vulnerable kernel could get root?

I'm thinking 'highly critical'?



On 7/13/06 4:24 PM, "Morning Wood" <[EMAIL PROTECTED]> wrote:

  
  

  Debian Development Machine Hacked
http://lists.debian.org/debian-devel-announce/2006/07/msg3.html
or
http://www.zone-h.org/content/view/13853/31/
  

Confirmed hacked by:
Linux Kernel PRCTL Core Dump Handling Privilege Escalation Vulnerability

http://www.debian.org/News/2006/20060713

or

http://www.zone-h.org/content/view/13853/31/  ( updated )

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  
  

==
David Taylor //Sr. Information Security Specialist
University of Pennsylvania Information Security
Philadelphia PA USA
(215) 898-1236
http://www.upenn.edu/computing/security/
==

Penn Information Security RSS feed
http://www.upenn.edu/computing/security/rss/rssfeed.xml
Add link to your favorite RSS reader



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


__ NOD32 1.1659 (20060713) Information __

This message was checked by NOD32 antivirus system.
http://www.eset.com



  




begin:vcard
fn:Arnaud Dovi / Ind. Security Researcher
n:Dovi;Arnaud
email;internet:[EMAIL PROTECTED]
tel;work:Independent Security Researcher
version:2.1
end:vcard

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Debian Development Machine "Gluck" Hacked - UPDATE

2006-07-13 Thread David Taylor
Curious why Secunia is rating this as 'less critical'.  The way I see it,
this exploit could be integrated into the other exploits for mambo, joomla,
phpbb, etc.  Also, all of us that have websites hosted on linux machines
that have a vulnerable kernel could get root?

I'm thinking 'highly critical'?



On 7/13/06 4:24 PM, "Morning Wood" <[EMAIL PROTECTED]> wrote:

> 
>> Debian Development Machine Hacked
>> http://lists.debian.org/debian-devel-announce/2006/07/msg3.html
>> or
>> http://www.zone-h.org/content/view/13853/31/
> 
> Confirmed hacked by:
> Linux Kernel PRCTL Core Dump Handling Privilege Escalation Vulnerability
> 
> http://www.debian.org/News/2006/20060713
> 
> or
> 
> http://www.zone-h.org/content/view/13853/31/  ( updated )
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/


==
David Taylor //Sr. Information Security Specialist
University of Pennsylvania Information Security
Philadelphia PA USA
(215) 898-1236
http://www.upenn.edu/computing/security/
==

Penn Information Security RSS feed
http://www.upenn.edu/computing/security/rss/rssfeed.xml
Add link to your favorite RSS reader



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Debian Development Machine "Gluck" Hacked - UPDATE

2006-07-13 Thread Morning Wood



Debian Development Machine Hacked
http://lists.debian.org/debian-devel-announce/2006/07/msg3.html
or
http://www.zone-h.org/content/view/13853/31/


Confirmed hacked by:
Linux Kernel PRCTL Core Dump Handling Privilege Escalation Vulnerability

http://www.debian.org/News/2006/20060713

or

http://www.zone-h.org/content/view/13853/31/  ( updated )

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/