maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   General (https://talk.maemo.org/forumdisplay.php?f=7)
-   -   Holy cow, we have been dirty for 9 years (https://talk.maemo.org/showthread.php?t=97919)

mr_pingu 2016-10-21 12:26

Holy cow, we have been dirty for 9 years
 
http://arstechnica.com/security/2016...ctive-exploit/

Quite a massive number of devices that are vulnerable to this bug as it's quite an old feature and only discovered now. Then to think many android phones won't get an kernel-update probably. I am assuming android is just as vulnerable as any other linux distro with old kernel.

meego_leenooks1 2016-10-21 16:45

Re: Holy cow, we have been dirty for 9 years
 
A distaster for the servers and a Holy Grail for the handhelds.

mikecomputing 2016-10-21 18:18

Re: Holy cow, we have been dirty for 9 years
 
AFAIU you first have to login via ssh(or similar) as normal user to the phone before you can gain root access I don't see it as critical on phone but worse on web sites.

"The exploits can be used against Web hosting providers that provide shell access"


And how many of you give out ssh access to your phone?

However I hope SFOS next release has the fix.

coderus 2016-10-21 19:13

Re: Holy cow, we have been dirty for 9 years
 
this exploit can be easily used by any malware application you install :)

eccerr0r 2016-10-22 01:51

Re: Holy cow, we have been dirty for 9 years
 
Apparently the "fix" was identified, any ideas when this will be backported to KP?

Not sure about 2.6.28, but backported to my 4.0.5 server, there had been changes so the patch in the commit wouldn't cleanly go in... but was close enough to easily figure out

Supposedly it's been around since 2.6.22 but "harder" to exploit ... and as I don't have many random binaries I run on my N900, probably somewhat safe. The regular PCs with <koff>flashplayer and any with outward facing shell access I have to be worried about...

meego_leenooks1 2016-10-22 05:32

Re: Holy cow, we have been dirty for 9 years
 
Quote:

Originally Posted by mikecomputing (Post 1517136)
AFAIU you first have to login via ssh(or similar) as normal user to the phone before you can gain root access I don't see it as critical on phone but worse on web sites.

Nope, your phone could be rooted by nice looking app which is in fact the chinese hackers' malware sneaked into Play Market / App Store e.g. http://www.ibtimes.co.uk/chinese-hac...s-risk-1520592 so it's kinda critical too.
BUT at the same time you could root your own phone if you need it and if the phone manufacturer prevents you from getting root access. So I find this vulnerability as somewhat good for the handhelds power users.

Quote:

Originally Posted by mikecomputing (Post 1517136)
"The exploits can be used against Web hosting providers that provide shell access"

And concerning the servers - it is a total disaster. You do not need the shell access to own your hosting provider's server - you just need exec/system/etc function enabled in PHP configuration and even if such functions are disabled there are plenty of other ways to run shell code where the simplest is - running a cron job from the control panel.

nthn 2016-10-22 14:23

Re: Holy cow, we have been dirty for 9 years
 
Quote:

Originally Posted by meego_leenooks1 (Post 1517154)
http://www.ibtimes.co.uk/chinese-hackers-fool-google-put-one-million-android-users-risk-1520592

"The intelligence-testing Brain Test app was discovered to be containing the malware by security firm Check Point."

Honestly, if you install "Brain Test" applications, you're bound to get hacked in some way eventually.

Every time these supposedly extreme security flaws come up, it turns out to be something you need to explicitly allow. That isn't a security problem, it's a user problem, and those have turned out to be impossible to fix.

meego_leenooks1 2016-10-22 17:02

Re: Holy cow, we have been dirty for 9 years
 
Quote:

Originally Posted by nthn (Post 1517162)
"The intelligence-testing Brain Test app was discovered to be containing the malware by security firm Check Point."

Honestly, if you install "Brain Test" applications, you're bound to get hacked in some way eventually.

That's just the first example I found in Google. I've seen news about dozens or hundreds of innocent-looking apps in Play Market / App Store with hidden ad/spy/mal-ware inside. Surely you have to explicitly allow them to run (install them yourself) but how do you know which app is clean and legitimate and which is not?

pichlo 2016-10-22 17:50

Re: Holy cow, we have been dirty for 9 years
 
9 years. So much for shallow bugs.

t-b 2016-10-22 18:09

Re: Holy cow, we have been dirty for 9 years
 
Quote:

Originally Posted by meego_leenooks1 (Post 1517167)
That's just the first example I found in Google. I've seen news about dozens or hundreds of innocent-looking apps in Play Market / App Store with hidden ad/spy/mal-ware inside. Surely you have to explicitly allow them to run (install them yourself) but how do you know which app is clean and legitimate and which is not?

Indeed, as long as those apps are proprietary / closed source you just don't know. A ton of Google Play programs ask for permissions that don't make sense. Why should a game need access to your contacts etc..
On an Android phone I assume with cyanogenmod (no gapps) and only install apps from the f-droid repo you will prevent installing any malicious software and are relatively safe.


All times are GMT. The time now is 00:55.

vBulletin® Version 3.8.8