Linux security vulnerabilities lurking around you

Source: Internet
Author: User
Tags ftp access

In this article, I will share with you some real-world Linux security vulnerabilities.

Generally, the simplest vulnerability is to obtain unprotected NetBIOS sharing information from a Linux system. Defective Samba configuration files are usually prone to leakage. For example, file sharing may end your troubles for convenience. I have seen Samba-based Linux systems share resources that allow all people on the network to access sensitive information, including patient health records and detailed information such: infrastructure system password and source code.

Some attacks are very simple to execute. All the people who execute these tasks must log on to the network with normal Windows user permissions, even if they do not have administrator permissions) and run a network security and vulnerability scanning tool like GFI logging ard, then run an information search tool similar to FileLocator. In this way, it is really easy for anyone to obtain confidential files that should not be accessed, and this will never be noticed.

The related attacks only target users who are not well configured with FTP servers. Their servers allow anonymous connections or set weak passwords or even no passwords. Here is an example to illustrate:

 
: Anonymous FTP in Linux results in Data Access

In this case, provide anonymous FTP access to the configuration file to obtain the password from the financial management database encoding, where you can obtain the desired information.

Another type of Samba may cause remote user enumeration. When Samba configuration in a Linux system allows visitor access, Vulnerability Scanners like Nessus and QualysGuard can collect user names. In most cases, attackers can use this user name to attack Linux accounts in subsequent password cracking. In many cases, you can also use a web vulnerability scanner similar to WebInspect or Acunetix without installing Apache in httpd. to collect the account information of Linux users.

I have recently seen this problem about passwords. When a CGI application runs on a Linux-based Web server, it does not properly filter input information, in addition, local files can be contained in HTTP queries, as shown in figure 2.

 
: Website input verification problems may cause Linux files to be accessed

In this particular case, hundreds of user accounts will be leaked in the Linux Password File returned by the Web application. Although this password is blocked, it is still easy to crack the system password because all user accounts are known. This type of attack may also cause other Linux operating systems and data files to be easily exposed.

Finally, if I did not mention the patch, I would be remiss. It is demonstrated that it is one of the most vulnerable vulnerabilities that lead to the worst results. This applies to operating systems and third-party software. For example, in this case, an attacker can use free tools such as Metasploit to obtain all the permissions of the operating system in step 3 within just a few minutes after being connected to the Internet.

 
: Use this Metasploit tool to use expired Samba versions.

Similarly, in most cases, it is too late to know such an attack.

Sometimes you will find that the Linux kernel itself does not recognize some vulnerabilities, but they will still be exploited to generate more Linux system problems. When you perform a Linux vulnerability check, do not forget to view your Linux system from every angle. It is because some problems cannot be exploited from the outside. It does not mean that they cannot be abused by so-called "trustworthy" people after logging on through normal logon. In addition, because the risk report does not list every security risk in the system environment, you need to use automatic scanning tools with reservation for some discoveries. Filtering out important items from the remaining electronic interference signals will only make you invest too much and cause more trouble.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.