26 September 2007 | 21,721 views

Gentoo Pulls the Plug after Getting Pwned

Check For Vulnerabilities with Acunetix

Gentoo Pulls the Plug after Getting Pwned

Gentoo pulled quite a few of it’s servers recently following the discovery of a fairly severe flaw in it’s systems.

Just to show that Linux systems aren’t invulnerable and immune to all security issues.

Ubuntu suffered quite heavily recently too, so don’t assume just because you use Linux you’re safe.

Admins with the Gentoo Project say they have disconnected major parts of its website a week after discovering it could be vulnerable to a command injection attack that allows bad guys to remotely execute code on the machine.

At time of writing, users trying to access Gentoo Archives and at least seven other areas of Gentoo.org got a message saying they were unavailable. Gentoo pulled the server hosting the sections “to prevent further exploitation and to allow for forensic analysis,” according to Gentoo’s homepage.

The words “further exploitation” and “forensic analysis” suggest the server was pwned, but Gentoo assures us the damage was minimal.

Not to say Linux is intrinsically unsafe either, you are definitely safer using Linux than Windows, especially if you don’t spend all your time using root.

Just be wary.

Members intend to rebuild the server and will also perform a security audit on source code for packages.gentoo.org, which is the service containing the injection vulnerability. According to this advisory, the vulnerability allows the remote execution of code by attaching a semicolon to the end of the URL, immediately followed by the command an attacker wants to run. The bottom of the page will then display the output of that command.

Gentoo’s advisory comes a week after Ubuntu unplugged five of its eight production servers following the discovery they had been so badly compromised that they were being used to attack other sites. Turns out the systems, which were sponsored by Canonical and hosted by the community, were running an old version of Ubuntu. Tsk, tsk.

The irony is…Gentoo servers are hosted on Ubuntu, old versions of Ubuntu with flaws!

Source: The Register



Recent in General News:
- Google’s Chrome Apps – Are They Worth The Risk?
- Twitter Breach Leaks 250,000 User E-mails & Passwords
- More Cyberterrorism – Taiwan Political Party Accuses China of Hacking

Related Posts:
- ksymhunter – Routines For Hunting Down Kernel Symbols
- Google Chrome Set To Follow Firefox In Blocking Out-of-date Plug-ins
- Kon-Boot – Reset Windows & Linux Passwords

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,082 views
- eEye Launches 0-Day Exploit Tracker - 85,075 views
- One Of The World’s Most Prolific Music Piracy Groups Busted - 43,465 views

Advertise on Darknet

4 Responses to “Gentoo Pulls the Plug after Getting Pwned”

  1. J. Lion 14 February 2008 at 1:18 am Permalink

    This was a sad day…

  2. eM3rC 14 February 2008 at 3:38 am Permalink

    That is very very ironic. One would guess a computer company would use their own software… Says something about Ubuntu or Gentoo…

    Although the flaw was found I would still say Linux is by far a more secure operating system. I plan on switching over one I have the free time to learn how to use it.

    R.I.P. Gentoo

  3. eM3rC 14 February 2008 at 3:40 am Permalink

    Quick side note…
    Red Hat and whatever linux OS Sun makes have been given the highest rankings for most secure OS.

  4. fever 8 April 2008 at 7:38 pm Permalink

    sun uses unix not linux. they make SunOS which is a unix-like operating system and is not related to linux. they also make Solaris which is Java Desktop Environment on top of SunOS.