Linux infection proves Windows malware monopoly is over
Chan Chung Hang Christopher
christopher.chan at bradbury.edu.hk
Wed Jun 16 15:21:32 BST 2010
Basil Chupin wrote:
> On 15/06/10 20:22, Chan Chung Hang Christopher wrote:
>>
>>> I am not sure that this really answers the question....
>>>
>> A properly setup and maintained Linux box will not be cracked.
>>
>
>
> If you say so, but then it is only you stating it.....
Well, with the reports of remote root exploits of sendmail and BIND
hitting zero lately, I guess I have a good chance of hosts with a
certain range of services making my statement stand.
But, of course, being able to drop something in the hope of it being run
as root does count I guess. I wonder what the current state of affairs
with regards to buffer overruns and the like...
>
>
>>>> DJB
>>>>
>>> Who is DJB?
>>>
>> Dan J. Berstein.
>>
>
> Who is Dan J. Berstein?
>
A very busy and maybe boring person?
>
>>>> ran a class not too long ago where his students concentrating on
>>>> find security holes in daemons...they found a fair few and wrote exploit
>>>> code IIRC.
>>>>
>>>>
>>> Doesn't really confirm anything for me - sorry :-) .
>>>
>>> Facts, man, facts :-) .
>>>
>> What, the long list of security vulnerabilities (which have been fixed -
>> except very recent ones maybe) for Linux and for software like sendmail,
>> BIND and other stuff not evidence enough for you that Linux boxes can be
>> cracked if not locked down and maintained properly?
>>
>
>
> References, old boy, references..... :-) . Without references what you
> write is no more credible than the writings of that journo wot wrote the
> article which is now being talked about here.... :-) .
>
/me shrugs. I am sure someone will come out with references to the
contrary if I made a wrong assertion.
Feel free to prove me wrong old chap.
More information about the sounder
mailing list