Gentoo Pulls the Plug after Getting Pwned
Gentoo pulled quite a few of it’s servers recently following the discovery of a fairly severe flaw in it’s systems.
Just to show that Linux systems aren’t invulnerable and immune to all security issues.
Ubuntu suffered quite heavily recently too, so don’t assume just because you use Linux you’re safe.
Admins with the Gentoo Project say they have disconnected major parts of its website a week after discovering it could be vulnerable to a command injection attack that allows bad guys to remotely execute code on the machine.
At time of writing, users trying to access Gentoo Archives and at least seven other areas of Gentoo.org got a message saying they were unavailable. Gentoo pulled the server hosting the sections “to prevent further exploitation and to allow for forensic analysis,” according to Gentoo’s homepage.
The words “further exploitation” and “forensic analysis” suggest the server was pwned, but Gentoo assures us the damage was minimal.
Not to say Linux is intrinsically unsafe either, you are definitely safer using Linux than Windows, especially if you don’t spend all your time using root.
Just be wary.
Members intend to rebuild the server and will also perform a security audit on source code for packages.gentoo.org, which is the service containing the injection vulnerability. According to this advisory, the vulnerability allows the remote execution of code by attaching a semicolon to the end of the URL, immediately followed by the command an attacker wants to run. The bottom of the page will then display the output of that command.
Gentoo’s advisory comes a week after Ubuntu unplugged five of its eight production servers following the discovery they had been so badly compromised that they were being used to attack other sites. Turns out the systems, which were sponsored by Canonical and hosted by the community, were running an old version of Ubuntu. Tsk, tsk.
The irony is…Gentoo servers are hosted on Ubuntu, old versions of Ubuntu with flaws!
Source: The Register