[vox-tech] Linux's Vulnerability to E-mail Viruses
Richard Crawford
vox-tech@lists.lugod.org
24 Apr 2002 21:55:22 -0700
Mike,
I'd like to pass this on to another list that I'm on which is discussing
just this issue. May I?
Richard
On Wed, 2002-04-24 at 21:47, msimons@moria.simons-clan.com wrote:
> On Wed, Apr 24, 2002 at 09:21:12PM -0700, Richard S. Crawford wrote:
> > I'm operating under the assumption that while viruses for Linux that
> > spread like Windows viruses are very rare, there are still some out
> > there.
> >
> > So, given that, what level of vigilance is necessary against incoming
> > viruses in a Linux system?
>
> Richard,
>
> Short answer: don't read email as root, don't open attachments from
> email ever, do update your mail handling system from time to time
> especially if you heard about an exploit in some component you use,
> and do think before you react to an email.
>
>
> Email borne viruses fall into three main categories:
>
> - Vulnerabilities in your mail handing system,
> (mail server, fetchmail, procmail, email client, etc...)
>
> Which typically stack overflow problems and should be very rare
> and fixed by the upstream maintainers in a heart-beat once found
> (sometimes quietly fixed) however these fixes get a fair amount of
> publicity if found in the wild.
>
> - Vulnerabilities in your attachment processing system or programs,
> (mail client auto-open-attachments, mailcap,
> openoffice, abiword, gnumeric, etc...)
>
> A mailcap configuration _can_ be extremely dangerous, because you
> can elect to do anything you want with a data stream based on it's
> mimetype. If you pass a outside data stream to a vulnerable program
> with mailcap or even manually you are at risk of any exploits against
> that program.
>
> There are a large number of these holes which exist, and some
> get created or closed every day. Basically any program you run
> that can be feed an input file and crashes is a hole should not
> be trusted with a mail borne data stream. Fixes are not generally
> well published, as long as you stick to text based email you are safe.
>
> If you are doing mail as your own user the good news is you can
> not damage the system, just wipe out the files owned by your user
> account. This is until someone builds a super virus which would
> get initial user access through an application vulnerability then
> run a collection local-root exploits to take over root. This will
> be front page news practically ever where.
>
> - Vulnerabilities in wetware processing the mail,
> ("send to all your friends or else", "Make money fast",
> "do X and your hair won't fall out"
> save-to-file/change-to-file/chmod-to-executable/run-[as-root])
>
> There isn't much that can be done about these people, short
> of turning on spam filters, education, or execution (depending
> on your stance).
>
> TTFN,
> Mike
> _______________________________________________
> vox-tech mailing list
> vox-tech@lists.lugod.org
> http://lists.lugod.org/mailman/listinfo/vox-tech
--
Sliante,
Richard S. Crawford
mailto:rscrawford@mossroot.com http://www.mossroot.com
AIM: Buffalo2K ICQ: 11646404 Yahoo!: rscrawford
MSN: underpope@hotmail.com
"It is only with the heart that we see rightly; what is essential is
invisible to the eye." --Antoine de Saint Exupery