it is after authentification ... you need to be a local user . however security experts may correct this but let's imagine you have a hole somewhere in your website (relatively common/frequent in php ?) that allow an access to a system call ! becoming root is straightforward ...
you are never too careful ! what do u mean exactly by ssh pipe ? 2008/2/14, Reinier Battenberg <[EMAIL PROTECTED]>: > > > Would you first need to be a local user? (so is this after > authentication), or > would any ssh pipe into the server be enough to exploit this? > > > > On Thursday 14 February 2008 12:49:53 Ben wrote: > > A local root exploit has been released some few days ago. This very > critical > > failure allows a local user to gain root access on a machine, using a > bug in > > the system function vmsplice(). > > > > Kernel version concerned is 2.6. (Linux 2.6.17 - 2.6.24.1) > > > > To fix it you need to upgrade your kernel, and of course reboot the > machine. > > That makes this security hole even more critical > > > > for an update under debian : > > > > > aptitude update > > > aptitude ugrade > > > aptitude dist-upgrade > > > and reboot ! > > > > > > > Gues it is the same under Ubuntu ... > > > > Here is the Debian security report: > > http://www.debian.org/security/2008/dsa-1494 > > > > Details about the exploit : > > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464953 > > http://lwn.net/SubscriberLink/268783/c6a3f3433044e10b/ (not read!) > > > > I have personnaly tried it (link in French : > > > http://www.tux-planet.fr/blog/?2008/02/12/224-local-root-exploit-sous-linux > ) > > and it is very impressive (and scary !) > > > > If you don't have an open access to your machine from the outside world > you > > are relatively safe ... but never know ! > > > > Cordially, > > > > > > > -- > rgds, > > Reinier Battenberg > Director > Mountbatten Ltd. > +256 782 801 749 > www.mountbatten.net > _______________________________________________ > LUG mailing list > [email protected] > http://kym.net/mailman/listinfo/lug > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ > > The above comments and data are owned by whoever posted them (including > attachments if any). The List's Host is not responsible for them in any way. > --------------------------------------- > >
_______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
