Korean Mozilla Binaries Infected 592
Magnus writes "Korean distributions of Mozilla and Thunderbird for Linux were infected with Virus.Linux.RST.b. This virus searches for executable ELF files in the current and /bin directories and infects them. It also contains a backdoor, which downloads scripts from another site, and executes them, using a standard shell."
Virus data (Score:5, Informative)
Here's Symantec's take on the virus:
http://securityresponse.symantec.com/avcenter/ven
Everything is vulnerable. (Score:3, Informative)
Black day for Unix Firefox users (Score:5, Informative)
source? (Score:4, Informative)
They could have easily replaced the app signatures to match the infected binaries.
Re:Secure.. (Score:5, Informative)
Re:6 stories down on the front page (Score:4, Informative)
No, no, no... Windows is as secure. (Score:3, Informative)
Ehh, this is a hijacked package. (Score:1, Informative)
Re:6 stories down on the front page (Score:5, Informative)
Funny? Yes. True? No - you see its not exactly a mozilla problem.
Whilst searching for more information about this, I stumbled across this page [mozillazine.org]last time these servers were hacked in June).
Choice quote:
So, its not mozilla.org (the article states "on public servers. Mozilla.org is the latest example")
Its someone who's taken the mozilla source and made their own binaries. A problem yes, a serious problem even, but not to the scale that Kaspersky Labs would have us believe.
Who would have thought it? A security company overhyping an issue!
I'm not sure why they bother. Do they really think stories like this are going to make linux users go and buy their security 'solution'?
Normal installation runs binaries as root (Score:5, Informative)
Before everybody starts pointing out that they don't browse the web with their root account, and so can't write to any of the binaries on their system, you should be aware that one of the infected files is the installer - which most people do run as root.
Also, even if you don't run the installer binary, but simply unpack the tarball manually, the release notes tell you to run included binaries as root as part of the normal multi-user installation process [mozilla.org].
Re:Virus data - It's old! RTFM (Score:4, Informative)
"Infected binary or source code files aren't anything new. And sometimes they are found on public servers. Mozilla.org is the latest example.
Korean distributives for mozilla and thunderbird for linux turned out to be infected - mozilla-installer-bin from mozilla-1.7.6.ko-KR.linux-i686.installer.tar.gz and mozilla-xremote-client from thunderbird-1.0.2.tar.gz were infected with Virus.Linux.RST.b"
Linux.RST.B was not effective virus in 2002 (Score:3, Informative)
OSS virus software - Clam AntiVirus (Score:1, Informative)
The article suggests that one should scan the files downloaded from the internet for viruses.
For excellent antivirus software see free open source Clam AntiVirus [clamav.net].
Re:Let the thrashing begin! (Score:3, Informative)
(Also, I wouldn't be surpised if they have pgp sigs somewhere for the Linux tarballs, but that takes work to verify.)
Fine under Linux emu and OpenBSD (Score:1, Informative)
I can trace the code trying to run but OpenBSD just err's out a message to the console and Mozilla keeps running.
Awesome.
Re:Virus data (Score:3, Informative)
Uploaded by *whom*?
The files weren't on the Mozilla site, they were on a third-party site that Mozilla neither owns nor controls.
Re:No, no, no... Windows is as secure. (Score:2, Informative)
Re:Secure.. (Score:2, Informative)
I think people need to quit complaining that they cannot run as regular users as windows. Use RunAs if you a pain in the ass game that requires admin access
no surprise (Score:5, Informative)
http://www.mozillazine.org/talkback.html?article=
I'm thinking they should give up their domain which likely causes the confusion and give the false impression that what you are downloading from the site is an official Mozilla binary.
burnin
Re:Infecting /bin? (Score:3, Informative)
In either case, the hash would have shown valid. I was under the impression hashes (MD5, SHA-1) were mostly just for making sure nothing was corrupt in the transfer.
Digital signatures are for ensuring validity, though they wouldn't protect against the case of a maintainer signing infected code by mistake.
-Charles
Re:Virus data (Score:2, Informative)
If you are going to correct someone's grammar, make sure you get it right yourself.
Re:Virus data (Score:3, Informative)
Re:Alan Cox was right (Score:3, Informative)
Re:Alan Cox was right (Score:1, Informative)
Re:Ha. (Score:3, Informative)
HOW YOU RIKE ME NOW HANS BRIX?
you cant install software as a normal user (Score:1, Informative)
Re:So let me get this straight... (Score:3, Informative)
However, what you seem to have forgotten to mention is that the primary use of these scanners is to scan emails for Windows viruses, not Linux viruses. And while it does look like these scanners have the ability to scan your filesystem for infected binaries, that's probably meant more to scan filesystems mounted by Windows boxes via SMB ... for Windows viruses.
Sure, their virus signature databases probably do have some Linux viruses in there, but scanning for them is not the main reason that people install clamav and similar programs.
Yes, there are Linux viruses out there. However, the usual architecture of a Linux installation (restrictive permissions, user processes not having permissions to alter most binaries) makes it very difficult for a virus to propagate the way most Windows viruses do -- by infecting binaries. (Granted, Windows can be run in the same way, but since it breaks so many things, it's rarely done unless programatically enforced by an IT department.)
That, and most *nix mail readers and web browsers are not as willing to execute arbitrary code it finds as IE and Outlook unless explicitly told to do so.
But, if you do find a virus, and run it as root ...
Re:Alan Cox was right (Score:5, Informative)
Download the key (RPM-GPG-KEY-fedora for example)
rpm --import RPM-GPG-KEY-fedora
And voila. This works for third party developer's keys.
As for your other comments they are just misinformed, you should read the article maybe. Or not and justmake stuff up, that works too.
Re:No, no, no... Windows is as secure. (Score:2, Informative)
http://www.phrack.org/phrack/62/p62-0x0d_Bypassin
I understand you were being funny though : )
Re:So let me get this straight... (Score:4, Informative)
Since official debian packages are signed, it's easy to trust the repository and the contributers due to the magic of the PGP web of trust and the Debian developer vetting process. It's not like you're installing software from some random people you don't know, and it's certainly not like the mirror you use could be compromised as long as the signature is valid.
You install mozilla as root, right?
Is somebody forcing you? I never install as root if the package didn't come from a trusted location. If I want to test a nightly, even the binary tarballs from mozilla.org go in my user directory, and aren't installed system wide.
It's the dumb user that's vulnerable, not the OS. That's equally as true for Windows as it is for Linux.
check your md5sums and gpg sigs ! (Score:2, Informative)
Though what I don't know is why mozilla doesn't insist more on that (you have to go on the ftp site clicking on "other systems" to find the checksums and signatures : ftp thunderbird [mozilla.org])
Because you cannot ... (Score:5, Informative)
http://securityresponse.symantec.com/avcenter/ven
http://securityresponse.symantec.com/avcenter/ven
http://securityresponse.symantec.com/avcenter/ven
http://securityresponse.symantec.com/avcenter/ven
You see? All but one had "number of sites" between 0 and 2.
They
Do
Not
Spread
Linux's security model is far more effective than Microsoft's one for Windows.
Anyone can write a virus/worm/trojan for Linux, but they cannot get them to spread beyond any machine that they themselves do no have access to.
Re:Alan Cox was right (Score:2, Informative)
Uh, Debian signs packages and repositories. And it actually maintains its' own packages. Not going to find the power of Xen [slashdot.org] signed by RedHat. In Debian, sure. With DSA updates, you can trust a rogue developer with lax programming techniques.
Anything not signed by Debian requires user intervention by default. Repositories outside the standard distribution (i.e for Adobe Acrobat, RealPlayer, non-US DVD ripping and encoding tools, etc.) have signatures too, but I have added them to my keyring myself to avoid prompts about installing untrusted software. Package md5sums still validate package integrity.
This is standard behaviour in Etch and Sid. The repository signatures are not in apt in Sarge by default.
What is the cost of all this hard security maintenance? Well using modern techniques, this estimate [upgrade-cepis.org] is worth a read.
iMac
Re:Black day for Unix Firefox users (Score:2, Informative)
Re:So let me get this straight... (Score:2, Informative)
> You install mozilla as root, right?
Actually, for anyone out there who even marginally cares about thier system, you can install like:
nothing untrusted running as root.
didnt take longer than 15 seconds.
Re:If Microsoft did it, it would be Microsoft. (Score:3, Informative)
The question of what constitutes a normal distribution channel in this case is a good one, however.