Profile

unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Unixronin

December 2012

S M T W T F S
      1
2345678
9101112131415
16171819202122
23242526272829
3031     

Most Popular Tags

Expand Cut Tags

No cut tags
Tuesday, February 12th, 2008 12:29 pm

Most folks who care have probably heard about this Linux kernel vulnerability by now.  And a lot of people out there are probably thinking, "Ah, but it's a local exploit, I'm safe as long as I don't give access to anyone I don't trust."  Even securitywire says, "It may not be remotely exploitable, but [...]"

But remember, what this means is that now, a remote attacker doesn't have to get a privileged shell.  All they have to do is get a shell ... any shell ... with the ability to (via one route or another) place a compiled copy of the exploit code in, say, /tmp and execute it.  To quote Mari Nichols of SANS,

"I believe Secunia has correctly identified this vulnerability as a local system vulnerability, but given that every server with a vulnerable kernel can be exploited to get elevated privilege, any unprivileged remote exploit can combine with it to form a remote root-level exploit."

Tags: