[vox-tech] Linux's Vulnerability to E-mail Viruses

vox-tech@lists.lugod.org vox-tech@lists.lugod.org
Thu, 25 Apr 2002 00:47:01 -0400


On Wed, Apr 24, 2002 at 09:21:12PM -0700, Richard S. Crawford wrote:
> I'm operating under the assumption that while viruses for Linux that
> spread like Windows viruses are very rare, there are still some out
> there.
> 
> So, given that, what level of vigilance is necessary against incoming
> viruses in a Linux system?

Richard,

  Short answer: don't read email as root, don't open attachments from 
email ever, do update your mail handling system from time to time
especially if you heard about an exploit in some component you use,
and do think before you react to an email.


Email borne viruses fall into three main categories:

- Vulnerabilities in your mail handing system,
  (mail server, fetchmail, procmail, email client, etc...)

    Which typically stack overflow problems and should be very rare
  and fixed by the upstream maintainers in a heart-beat once found 
  (sometimes quietly fixed) however these fixes get a fair amount of 
  publicity if found in the wild.

- Vulnerabilities in your attachment processing system or programs,
  (mail client auto-open-attachments, mailcap, 
   openoffice, abiword, gnumeric, etc...)

    A mailcap configuration _can_ be extremely dangerous, because you
  can elect to do anything you want with a data stream based on it's 
  mimetype.  If you pass a outside data stream to a vulnerable program 
  with mailcap or even manually you are at risk of any exploits against
  that program.

    There are a large number of these holes which exist, and some
  get created or closed every day.  Basically any program you run 
  that can be feed an input file and crashes is a hole should not
  be trusted with a mail borne data stream.  Fixes are not generally
  well published, as long as you stick to text based email you are safe.

    If you are doing mail as your own user the good news is you can
  not damage the system, just wipe out the files owned by your user
  account.  This is until someone builds a super virus which would 
  get initial user access through an application vulnerability then 
  run a collection local-root exploits to take over root.  This will
  be front page news practically ever where.

- Vulnerabilities in wetware processing the mail,
  ("send to all your friends or else", "Make money fast", 
   "do X and your hair won't fall out"
   save-to-file/change-to-file/chmod-to-executable/run-[as-root])

    There isn't much that can be done about these people, short
  of turning on spam filters, education, or execution (depending
  on your stance).

    TTFN,
      Mike