| |
UNIX is safe (not)Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. » nvd.nist.gov/vuln/detail ··· 20-14871 |
|
|
donoreo Premium Member join:2002-05-30 North York, ON |
donoreo
Premium Member
2020-Nov-3 7:33 am
Who still uses Solaris? Honest question, anyone I knew that ran it switched to something else a long time ago. |
|
dsless join:2001-05-16 Pittsburgh, PA |
dsless
Member
2020-Nov-4 11:19 am
Many companies still use Solaris for Oracle databases. It is not as easy as turning a switch and you are on Redhat. |
|
dennismurphyPut me on hold? I'll put YOU on hold Premium Member join:2002-11-19 Parsippany, NJ |
to donoreo
said by donoreo:Who still uses Solaris? Honest question, anyone I knew that ran it switched to something else a long time ago. You'd be shocked. I have customers with tens of thousands of instances and continuing to grow. It just works. |
|
dsless join:2001-05-16 Pittsburgh, PA |
dsless
Member
2020-Nov-5 11:28 am
Like you, my employer has many Oracle/Solaris instances running and we have been moving them slowly to other platforms and into the cloud. However, if you have people that can get to the server behind your firewall then a much large problem exists. It really boils down to where does the company and to spend its $$$$. |
|
Bry join:2008-12-31 Canada |
to Velnias
It's always PAM. This design is so terrible in that code is injected into a processes address space. Certainly bad for Solaris as this vulnerability has been in the wild for many years now and appears to have been known by bad actors. But avoid misinformation around this being anything but further proof of weakness in the PAM system and in this case, the implementation in Solaris. It's is also not a vulnerability in SSH itself, that is just an easy vector of exploitation.
-Bry. |
|
| |
Yes its PAM. I wonder how such important part of OS security system escaped auditors attention.
Its UNIX. Its ORACLE with plenty of money and kind of the best devs... and decent SUN legacy... |
|
camperjust visiting this planet Premium Member join:2010-03-21 Bethel, CT |
to Velnias
  I am not convinced that UNIX is safe or not safe. What I do see is that the approach to security in some (most?) UNIX distributions is very good. An OS being "safe" is a destination. But security is not a destination, it is a journey. How does a UNIX distribution (any UNIX distribution) handle security as an ongoing process. That is the question to ask. |
|
| |
Microsoft view of security is nothing more than just the business. Nothing personal fellow Americans. Zuck foreigners.
I'm sure one can make HelloWorld exploitable infinitely. I wonder what pixie powder is used for code running whole net itself. |
|
| |
to Velnias
said by Velnias:Yes its PAM. I wonder how such important part of OS security system escaped auditors attention. said by Fireeye Threat Research : The vulnerability has likely existed for decades, and one possible reason is that it is only exploitable if an application does not already limit usernames to a smaller length before passing them to PAM. One situation where network-facing software does not always limit the username length arises in the SSH server, and this is the exploit vector used by the tool that we discovered.
|
|
| |
to Velnias
The vulnerabilities of any *nix are vastly overblown compared to the alternative. |
|
Wily_One Premium Member join:2002-11-24 San Jose, CA |
to Velnias
said by Velnias:Its ORACLE with plenty of money and kind of the best devs... and decent SUN legacy... *cough* |
|
maartenaElmo Premium Member join:2002-05-10 Orange, CA |
to donoreo
said by donoreo:Who still uses Solaris? Honest question, anyone I knew that ran it switched to something else a long time ago. The DoD. In 2014 they made the decision to replace Solaris with Linux on the systems that used it (Among others UAV control), but 6 years later not everything has been changed yet..... because hey, the wheels of bureaucracy turn slowly.  In 2018, the last news report I can find on that, many systems were still running Solaris. The DoD also still runs HP-UX for several operations. |
|
| maartena |
to camper
said by camper:I am not convinced that UNIX is safe or not safe. There are exceptions, but in principle the OS is as safe as its user. If the world was reversed, and 95% of the world would run linux instead of windows, there would still be people running some sort of script that came by email, and blindly typing in their SUDO password without checking. |
|
camperjust visiting this planet Premium Member join:2010-03-21 Bethel, CT |
camper
Premium Member
2020-Dec-26 2:57 pm
said by maartena:in principle the OS is as safe as its user.   Agreed. But that is a bit of a tangent, no? |
|
| |
to maartena
Not again...
Windows server never was as secure as Linux/UNIX/BSD server. Windows never was as secure as billions Android smartphones with the same users. Android even without recent updates...
Don't blame users. Opening unknown file is not a deadly crime. Easy exploitable Windows is the problem. Always was. |
|
| |
Anon42c23
Anon
2020-Dec-27 9:03 am
Disagree here a bit. It depends on the targeted operating system and it depends on the security knowledge of the user. My wife runs Linux, I do "cyber security" for a living and have for probably the past decade and a half. Someone performed ATO (Account Take-Over) of an O365 mailbox that commonly communicates with my wife. They thread-jacked the thread similar to how Ursnif/Valak does, sent her an Emotet-laden maldoc, and provided contextual information to suggest she open it. She opened it in LibreOffice. I reversed the macro code and it has no impact on a Linux system. If it were targeting Linux she would have been compromised.
Windows, while being complete trash, is no more or no less secure than any other operating system in the context of the above. With the current threat landscape it should be known that ATO, BES, and the methods mentioned above *are* how Windows systems are being compromised outside of vulnerabilities themselves. Watching things like Redline Stealer or QasarRAT coming into corporate organizations via Maldoc droppers is extremely common. Exploit Kits are dead, well aside from a RigEK here and there.
Attackers aren't ignorant and aside from a skiddie here and there some of this stuff is well executed to exploit the weakest part of any system -- the user. It just so happens that the commonality of Linux and BSD systems as contrasted to Windows users is far fewer. Let's not kid ourselves, Linux isn't intrinsically more secure on the public Internet than a Windows system assuming proper and sane OSI Layer 3, Layer 4, and Layer 7 (LB/WAF) are in place. |
|
| Anon42c23 |
Anon42c23
Anon
2020-Dec-27 9:06 am
I should add, I despise Windows, but lets not suggest that Linux by virtue is better than Windows from a security aspect especially in context of the 'luser' of said system. I run FreeBSD and my wife and children run Linux. I've run my own MTA and webserver for the last 20+ years and it runs on Linux. |
|
| |
to Velnias
|
|
| |
to Velnias
OK, so Solaris may not be safe, but I am not seeing HP-UX, IBM AIX, Mac OSX, FreeBSD, NetBSD or any *BSD variations affected by Solaris issues... |
|
| |
Every platform has its issues. For proprietary platforms you don't always know about them and there are no CVEs nor other public disclosures but they most certainly do exist. I know of a few that are pretty nasty (no I can not and will not disclose any details as they are covered by an NDA). I thought that as we enter the third decade of the 21st century that we'd be past any remnants of "OS wars", but alas it seems not  If one blindly thinks that any given platform is necessarily "safe" generically then that person has not been paying attention for the past several decades. There are different types of issues that affect different types of platforms. That doesn't mean that just because one issue doesn't impact a platform that platform is somehow "safe". |
|
| |
|
|
DonoftheDeadOld diver Premium Member join:2004-07-12 Clinton, WA |
to Velnias
Money and convenience trump security just about every time. |
|
| |
to Velnias
Vulnerability in the Etch-A-Sketch design allows anyone with access to your sketch to change your drawing |
|