[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: down to the core



On Thu, 29 Jul 2004 08:19:24 -0700 (PDT), Mike wrote in message 
<[🔎] 20040729151924.16363.qmail@web11908.mail.yahoo.com>:

> --- ArArntaKarlsenararnt2i.net> wrote:
> 
> > On Wed, 28 Jul 2004 09:28:55 -0700 (PDT), Mike wrote in message 
> > <20040728162855.21881.qmqmaileb11904.mail.yahoo.com>:
> > 
> > > 
> > > --- ArArntaKarlsenararnt2i.net> wrote:
> > > 
> > > > On Wed, 28 Jul 2004 13:10:46 +1000, Daniel wrote in message 
> > > > <87pt6gogomhfsfsfnenkiirimspaceet>:
> > > > 
> > > > > One thing which will *not* enhance security, but is often
> > > > > claimed to do so, is disabling kernel modules.  Even if you
> > > > > don't use them, an attacker with root privileges can still
> > > > > insert code into the running kernel successfully, with the
> > > > > same result as loading a kernel module.
> > > > 
> > > > ..this would requires the presence of the loadable module, 
> > > > or _could_ the attacker provide it?
> > > > 
> > > You need root totodoodule loading.  With root you can also change
> > > kernel memory, so yes you could force a module to load.  It would
> > > be simpler just to add the missing code you need to the running
> > > kernel and then link it in.  None the less if you have root access
> > > the only reason you might need to load any kernel side code is for
> > > DMDMAr hahandelingWHWninterupts Since it's unlikely that an
> > > attacker would need or even care to do these things the point is
> > > moot.  BoBottomeine is if an attacker gets root it's ALL over,
> > > they can install any software ththayight need.
> > 
> > ..so basically, this boils down to whether or not it is 
> > possible to grab root with some kinda nenetcattunt.
> > 
> Correct.  As I remember you where running mail on port 25, it may be

..me?  You find anything port 25 on my fw box, I'd like to know.  ;-)

> popossibleo kill the mailer and then hack on a closed port 25.  If
> your asking if having another port open will be more of a security
> risk, then prprobablyot.  The security risk comes in when you
> acactuallytart running the server.  Harden your system from
> prprivilegescalation hahacksthen**when** a server is compromised the
> effect is miminimal

-- 
..med vennlig hilsen = with Kind Regards from Arnt... ;-)
...with a number of polar bear hunters in his ancestry...
  Scenarios always come in sets of three: 
  best case, worst case, and just in case.




Reply to: