Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Linux speared by trio of security holes

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
Nomad559 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-24-04 09:05 PM
Original message
Linux speared by trio of security holes
Linux speared by trio of security holes

A series of security holes in three common Linux components has led open-source vendors to rush out several updates.

Two of them, rated "highly critical" by security company Secunia, are in libpng, a library used by a number of applications, including the Mozilla browser to display png graphics files.

The problems are a boundary error in Mozilla's "png handle" function, and an integer overflow in the "png read" function. These flaws could potentially be exploited by malicious users to trick computer users into viewing a corrupted png image, and inadvertently linking an application into the vulnerable library. Ultimately, it means a hackers could execute arbitrary code on your PC.

In August, a number of security flaws were discovered in libpng, including a bug in the POP3 capability and a risk of unauthorized upload of data from a victim's computer.

More flaws have also been discovered in Xpdf, which is used to view Adobe pdf files in Linux. A series of integer overflow errors in Xpdf could seriously compromise a victim's system. As with the libpng vulnerability, malicious users could exploit the Xpdf vulnerability to execute arbitrary code using specially crafted pdf files.
Printer Friendly | Permalink |  | Top
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-24-04 09:13 PM
Response to Original message
1. Ignorant, typical of the tech media
None of these are "Linux" problems, any more than a problem in Adobe Acrobat is a "Windows" problem. These are applications developed entirely separate from the Linux kernel. Some, but not all Linux vendors include these applications as part of their distributions, but they're still not part of Linux.
Printer Friendly | Permalink |  | Top
 
Nomad559 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-24-04 09:25 PM
Response to Reply #1
6. Linux Kernel Multiple Vulnerabilities
Printer Friendly | Permalink |  | Top
 
qnr Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-24-04 09:29 PM
Response to Reply #6
7. And your point is? They're identified, they're worked on.
Edited on Sun Oct-24-04 09:31 PM by qnr
By a whole slew of mostly unpaid individuals. Whereas with Windows, they are put in there by "highly trained paid professionals" in the first place.
Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Oct-25-04 12:06 AM
Response to Reply #6
9. Ok - that's something different
For one thing, none of the vulns described there are remote-root vulnerabilities, the kind that make alert systems administrators grab for the Maalox. On top of that - a patch was available before anyone came up with working sploit code.

I make my living doing network security, and I can tell you that Windows and Linux, for all the religious wars associated with them, are a TOSS-UP as far as security is concerned. I can think of quite a few situations and applications where using a properly configured and locked down Windows server is the better, and more secure, choice. For example, how many more vulns have been found in BIND than Win2K DNS or dDNS? About a zillion. Same goes for the IIS SMTP server - as long as the machine is protected by a solid firewall (a.k.a. not Cisco PIX) keeping outside users from hitting anything but port 25, I'd have no problem putting that out on the big, bad Internet. Sendmail, the Linux/Unix MTA of choice, has been like Swiss cheese over the last 4 years or so, with at least 3 remote-root vulnerabilities that I can think of, all of which have been successfully exploited.

I was just pointing out that that article was truly ignorant of the fact that software that depends on the Linux kernel != Linux.
Printer Friendly | Permalink |  | Top
 
qnr Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Oct-25-04 12:17 AM
Response to Reply #9
10. I find the BSD variants to be more secure
in a server environment anyway.

As far as the comparison goes, you have some valid points. On the other hand, BIND (taken as an example you mentioned, could be replaced with many others) is updated much more often, so you're likely to come upon more glitches - glitches which are rectified more rapidly than the Windows ones, from what I've seen.
Printer Friendly | Permalink |  | Top
 
ForrestGump Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-24-04 09:14 PM
Response to Original message
2. Poor Linux!




I'm sad now...
Printer Friendly | Permalink |  | Top
 
Best_man23 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-24-04 09:16 PM
Response to Original message
3. Comparing security holes in Linux to those in Windows
Is like comparing a pinhole to the Grand Canyon.
Printer Friendly | Permalink |  | Top
 
Deja Q Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-24-04 09:20 PM
Response to Reply #3
4. And unlike Windows holes,
and as long as the user isn't logged in as Root or doing maintenance as a SuperUser (either of which would be stupid), the outbreak would be quite minimal.

Still, it shows that hackers (at least pro-Gate$ ones) won't stop at anything. Not sure I can entirely blame or hate them anymore given the state of the industry, but that's ambivalence for you.

Printer Friendly | Permalink |  | Top
 
qnr Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Oct-24-04 09:23 PM
Response to Original message
5. Here's a hint, Linux is the kernel. If they want to pretend
they're on top of things, then they need to come to terms with that little aspect of the situation.

If a dashboard light on my Winnebago goes out, I don't say it's a problem with the 454 Chevy under the hood.
Printer Friendly | Permalink |  | Top
 
PBX9501 Donating Member (231 posts) Send PM | Profile | Ignore Sun Oct-24-04 09:39 PM
Response to Original message
8. Linux is nothing new
Real unix like AIX and HP-UX have had ( still have) serious compromises. So did MVS. Z/OS (mainframe os) has them. Basically anything written by humans has holes and can be exploited. Nothing new here, trusted app gives user zero authority, or is forced to shell out giving user a prompt with su rights. People were cheating unix this way before linus was in diapers.

The mechanics of computing are very simple and people with understanding of this can compromise systems.
Printer Friendly | Permalink |  | Top
 
flaminbats Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Oct-25-04 12:32 AM
Response to Original message
11. I love the huge WindowsXP advertisement next to the article..
isn't the entire purpose of having open-source to allow users to improve the operating system flaws in the way which fits their needs?
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri May 03rd 2024, 08:31 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC