View Poll Results: Poll deleted

Voters
0. You may not vote on this poll
  • Deleted

    0 0%
  • Deleted

    0 0%
Page 2 of 2 FirstFirst 12
Results 11 to 14 of 14

Thread: Malware Threat To GNOME and KDE

  1. #11
    Therion is offline I Ubuntu, Therefore, I Am
    Join Date
    Sep 2007
    Location
    Right behind you...
    Beans
    2,768
    Distro
    Ubuntu Karmic Koala (testing)

    Re: Malware Threat To GNOME and KDE

    Quote Originally Posted by sonofusion82 View Post
    the idea is to reduce mistakes.
    Where exactly is the coding mistake in this instance?

    The article itself states:
    ...there is nothing fundamental about the architecture of Linux that prevents user stupidity or ignorance, which is of course the main ingredient in any attack vector like this.
    Furthermore...
    There is just one small stumbling block, which needs to be overcome. Well, two, actually.
    Finally...
    And here then is one more step that needs to be taken by the user, which might reduce the success rate of this attack vector a little. The user has to first save the attachment and then double click on it.
    This isn't a coding issue; this PEBCAK: Problem Exists Between Chair And Keyboard. Remove any single user error, and there's plenty to choose from it seems, and this attack fails.

    Utterly... FAILS.
    Last edited by Therion; February 18th, 2009 at 11:09 PM.

  2. #12
    Join Date
    Jan 2009
    Beans
    43

    Re: Malware Threat To GNOME and KDE

    Granted the premise concerning the vulnerability of launchers in the KDE or GNOME desktops...how is it that the script that is downloaded by the launcher becomes executable?

  3. #13
    Join Date
    Dec 2006
    Location
    Chicago
    Beans
    3,839

    Re: Malware Threat To GNOME and KDE

    Quote Originally Posted by matteojg View Post
    Granted the premise concerning the vulnerability of launchers in the KDE or GNOME desktops...how is it that the script that is downloaded by the launcher becomes executable?
    It doesn't need to be executable if you execute the shell directly with the script as an argument.

  4. #14
    Join Date
    Apr 2006
    Location
    Montana
    Beans
    Hidden!
    Distro
    Kubuntu Development Release

    Re: Malware Threat To GNOME and KDE

    I am going to close this thread now as it is not a very productive discussion. The previous discussion was closed, and that does not mean you may start a new one.

    Please see the sticky on the top of these forums and please do not spam these forums with links to personal web pages.

    If you wish to cite an authority on security that would be fine, but the author of those pages is certainly not an authority and your linking to his blog / opinion page borders on spam.

    The sticky address both issues you raise :

    1. Social engineering => educate users.

    2. Escalation of privileges. This requires #1 and you are already in deep trouble if you are limiting escalation of privileges. The current tools to allow this are apparmor and selinux, both of which are quite powerful.
    Last edited by bodhi.zazen; February 19th, 2009 at 12:32 AM.
    There are two mistakes one can make along the road to truth...not going all the way, and not starting.
    --Prince Gautama Siddharta

    #ubuntuforums web interface

Page 2 of 2 FirstFirst 12

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •