From: The Natural Philosopher on
Robert Heller wrote:
> At Sun, 13 Jun 2010 23:47:03 +0100 The Natural Philosopher <tnp(a)invalid.invalid> wrote:
>
>> General Schvantzkoph wrote:
>>> On Sun, 13 Jun 2010 21:13:27 +0000, Curt wrote:
>>>
>>>> On 2010-06-13, The Natural Philosopher <tnp(a)invalid.invalid> wrote:
>>>>> use the 64 bit nonfree and to hell with potential security wotsits.
>>>> Pretty scary wotsits.
>>>>
>>>>> Only one I got working ...
>>>> I'm with ya there.
>>> How scary is it really? What can these exploits do on a Linux system?
>> I suspect in general access anything you as a user running the browser,
>> have privileges to access.
>>
>> I only took a cursory glance, but it looks like the standard 'in
>> principle, a hacker could create a flash file that executed arbitrary code'
>>
>> Now if you are not running as root, that probably wouldn't compromise
>> the operating system, but it might rip through your address books etc.
>
> The thing with Linux is that 'your address books etc.' is not one thing
> that 90% of Linux users all use. In the Mess-Windows world you have
> like 90% (or some such large percentage) of MS-Windows users using
> Outlook [Express], so a hacker just needs to write code to hack into OE
> address book, and this will work on a large percentage of mess-windows
> boxen. Under Linux, the hacker has to write code that can hack,
> Thunderbird, Evolution, Pine, Elm, etc. Then it has to figure out
> where things are stored (since different distros might/could build each
> of the above with different defaults or even ship different versions).
> From a hacker POV, it is a real complexity mess. Note: This is not a
> proper end-user problem, since end users pick a (single) tool on a
> (single) distro and care not how another tool might store stuff on
> another distro. (Yes, some people play with different distros and
> different tools, but such people are not typical end-users.)
>
> The important bit of advice: don't store things like credit card numbers
> or on-line banking (and other 'sensitive') passwords in clear text
> files, that the 'arbitrary code' could get to.
>
the more likely nasty is that it reads your browser cache and uploads it
somewhere. Probably full of name/password combos.



From: David W. Hodgins on
On Sun, 13 Jun 2010 23:00:31 -0400, The Natural Philosopher <tnp(a)invalid.invalid> wrote:

> the more likely nasty is that it reads your browser cache and uploads it
> somewhere. Probably full of name/password combos.

Do like I do. Use a separate account (userid), for use with
each financial institutions, such as online banking. The
browser I use in that account, only sees my online bank, no
other websites.

Since my regular account does not even have read access to the
account I use for online banking, it can not get any financial
info.

If the hackers manage to hijack my banks website, I have much
more to worry about. I do take care to ensure my dns servers
ip addresses don't get hijacked, by turning off upnp, and
running my own copy of bind.

Regards, Dave Hodgins

--
Change nomail.afraid.org to ody.ca to reply by email.
(nomail.afraid.org has been set up specifically for
use in usenet. Feel free to use it yourself.)
From: Curt on
On 2010-06-13, General Schvantzkoph <schvantzkoph(a)yahoo.com> wrote:
> On Sun, 13 Jun 2010 21:13:27 +0000, Curt wrote:
>
>> On 2010-06-13, The Natural Philosopher <tnp(a)invalid.invalid> wrote:
>>>>
>>> use the 64 bit nonfree and to hell with potential security wotsits.
>>
>> Pretty scary wotsits.
>>
>>> Only one I got working ...
>>
>> I'm with ya there.
>
> How scary is it really? What can these exploits do on a Linux system?

http://www.adobe.com/support/security/bulletins/apsb10-14.html
From: Aragorn on
On Monday 14 June 2010 00:47 in comp.os.linux.misc, somebody identifying
as The Natural Philosopher wrote...

> General Schvantzkoph wrote:
>
>> On Sun, 13 Jun 2010 21:13:27 +0000, Curt wrote:
>>
>>> On 2010-06-13, The Natural Philosopher <tnp(a)invalid.invalid> wrote:
>>>
>>>> use the 64 bit nonfree and to hell with potential security wotsits.
>>>
>>> Pretty scary wotsits.
>>
>> How scary is it really? What can these exploits do on a Linux system?
>
> I suspect in general access anything you as a user running the
> browser, have privileges to access.
>
> I only took a cursory glance, but it looks like the standard 'in
> principle, a hacker could create a flash file that executed arbitrary
> code'

Isn't NX supposed to prevent that sort of thing?

> Now if you are not running as root, that probably wouldn't compromise
> the operating system, but it might rip through your address books etc.

Only if it knows what address books you are using. In Windows, Outlook
Expresss and the likes use a lot of common components with Internet
Explorer and the Windows scripting language or VBA or VBS - whatever
it's called - connects these "tools" together, and this is how a lot of
that malware operates.[1] It's all part of the single-user and
monoculture approach of the Windows design. In GNU/Linux there's no
such thing.


[1] At least, this is what I've read about it, I don't use Windows, but
I used to know more about it from when I was still in C.O.L.A. and
needed to point out to the trolls why their beloved OS sucked so
much. :p

--
*Aragorn*
(registered GNU/Linux user #223157)
From: Roger Blake on
On 2010-06-14, David W. Hodgins <dwhodgins(a)nomail.afraid.org> wrote:
> Do like I do. Use a separate account (userid), for use with
> each financial institutions, such as online banking.

Or do like I do. Don't use online banking.

--
Roger Blake
(Change "invalid" to "com" for email. Google Groups killfiled due to spam.)
"Obama dozed while people froze."