NOD32 on Linux
Smoot Carl-Mitchell
smoot at tic.com
Thu Feb 3 16:26:24 UTC 2011
On Thu, 2011-02-03 at 11:09 -0500, AV3 wrote:
> You may be right, but it seems more likely to me that only users folders
> would be at risk, not the system folder. So the makers of malware would
> have more limited rewards to look forward to. When confronted with Unix
> underpinnings of Mac OS X, the makers of malware for the old Mac OS just
> shriveled up and died.
There are still attack vectors into Unix and Unix like systems (Linux).
Daemons running with root privileges or setuid programs are a problem,
since if you obtain root privileges, you can do anything. The SELinux
framework if you enable it does mitigate some of these issues by
restricting application permissions further to specific folders or
files.
A user can thwart these measures by doing dumb things like using the
root account for everyday tasks or executing a trojan horse sent as an
email attachment or embedded as a link in a web page as root.
--
Smoot Carl-Mitchell
System/Network Architect
voice: +1 480 922-7313
cell: +1 602 421-9005
smoot at tic.com
More information about the ubuntu-users
mailing list