On 02/10/2011 03:06 PM, jdow wrote:
> Apparently it is active in the wild now. If a machine is not patched to
> the hilt, which Fedora discourages with updates that make the machine
> unusable once and awhile and upgrades needed several times a year it
> seems, you have problems.
>
> It is an exploit. It attacks Linux machines. That's proof that such
> things exist. If they exist then zero day exploits also exist that
> just have not been discovered yet. Safe is better than sorry.
>
> {^_-}
> On 2011/02/10 13:49, Fernando Cassia wrote:
>> On Thu, Feb 10, 2011 at 6:06 PM, jdow<[email protected]> wrote:
>>> heads up:
>>>
>>> if case you are using spamassassin milter:
>>>
>>> active exploits going on.
>>>
>>> <http://seclists.org/fulldisclosure/2010/Mar/140>
>>> <http://www.securityfocus.com/bid/38578>
>> Are you using a time machine to report news, from the past? look at the
>> dates...
>>
>> Published: Mar 07 2010 12:00AM
>> Updated: Apr 27 2010 02:22PM
>>
>> FC
Such things have been going on against UNIX and then Linux machines for
many many years.
The fact of a new attack vector neither diminishes security nor does it
need to cause a great alarm.
Any administrator worth his salt will read the CERT advisories when they
come out. He/she will also test updates in a closed test environment
for capabilities before pushing it to production.
Also, a good administrator already knows that 'Any compute platform
connected to a network is vulnerable.' and 'Even the most secure systems
are vulnerable if they can be accessed.'
There is little use for systems that cannot be accessed, and so a good
administrator is aware.
The real issue is two fold:
1. The vast number of compute systems across the Internet that are not
managed at all.
2. The inability of platform creators to consider security as a priority.
Personally, the more security a system has, the more that security
interferes with the operation and maintenance of the system, thus by its
very nature it encourages users to defeat any security measures they
encounter in order to enable or restore desired functionality.
These things are not operating system dependent. They are the nature of
all computing devices, from automobile engine tuning, to cell phone
rooting. From disabling SELinux in order to use an apache plugin or
module, to leaving mysql open to the Internet so that you can use
phpMysqlAdmin from home.
And the list goes on and on. All of those activities are FAR more
concerning than another email exploit.
Good Luck
--
users mailing list
[email protected]
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines