Security Incidents mailing list archives

Re: DNS CACHE POISONING? - Our Portal is redirecting to our first competition


From: Valdis.Kletnieks () vt edu
Date: Tue, 29 Jan 2008 13:59:21 -0500

On Tue, 29 Jan 2008 07:57:39 +0800, Eduardo Tongson said:
kernel used is fully updated and root SSH login dismissed do you know
a way of getting root without an unknown kernel bug?

The *vast* majority of "get r00t kwik" exploits do *not* involve exploiting
kernel bugs, but involve exploiting daemon processes running as root or
set-UID programs.  So if you have CUPS running, they don't need a kernel
exploit, they just need a CUPS exploit (and CUPS *has* had a few issues).
Same for Sendmail, NTP, the X server, or any of the other things found on
the average Unix/Linux install....

Attachment: _bin
Description:


Current thread: