On Fri, Apr 04, 2003 at 04:17:10AM +0300, Tzafrir Cohen wrote:
> On Fri, Apr 04, 2003 at 09:30:49AM +0800, John Summerfield wrote:
> > http://www.esj.com/News/article.asp?EditorialsID=472
>
> A piece of FUD. C&C try to create themselves a market.

And the part I liked the most:

| Take Linux/Slapper, which utilized a known, OpenSSL buffer exploit to
| initiate denial-of-service attacks. Or TR/Linux.JBellz, discovered in
| January, which has code to wipe the current user's home directory
| files. Finally, W32/Winux, a proof-of-concept virus, starts on a Windows
| machine but can subsequently attack files on both a Windows or Linux
| machine. Though viruses that target multiple platforms are virtually
| unknown W32/Winux was created to prove a point expect their
| numbers to rise.

Brrrr! I'm scared!

Seriously now:

Such "linux-windows" proof-of-concept viruses has existed since 2000 or
2001, right? But they were still not spotted in the wild. This is becuse
you have to get the user to execute such a program. Actually you have to
get root to execute such programs. See my previous message as to why
this is not so easy on linux.

Writing a linux virus is probably quite easy. A trivial shell script.
Getting someone to execute this script will probably take some "social
engeneering". Espcially if you want root to do that. Getting many people
to do that will probably take much more than that.

And if and when such an attack will be mounted, it will easily bypass
any detection by CentralCommand or whatever (because it will be root
shooting itself in the leg).


But if you want to pay someone 35$/year for keeping your system secure,
do yourself a favour, and use some free (as in gnu-selling-software)
sollution. Such exist.


(Those virus scanners are mostly useful for scanning for windows
viruses under linux on a file/mail/proxy server)

--
Tzafrir Cohen                       +---------------------------+
http://www.technion.ac.il/~tzafrir/ |vim is a mutt's best friend|
mailto:[EMAIL PROTECTED]       +---------------------------+

Reply via email to