TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Linux backdoor attempt of 2003 (2013)

223 pointsby zhan_egover 1 year ago

11 comments

grugqover 1 year ago
I have the full story on that incident. It is actually really funny.<p>If the guy who did it wants to come forward, that is his decision. [edit: I won&#x27;t name names.]<p>He did provided me the full story. He told me with the understanding that the story would go public, so I will dig it up and post it.<p>I also interviewed the sysadmins who were running the box at the time.<p>1. it was not an NSA operation, it was done by a hacker.<p>2. it was discovered by accident, not because of clever due diligence.<p>Basically, there was a developer who had a flakey connection and one time his commits didn&#x27;t go through. To detect this in future he had a script that would download the entire tree from the server and compare it against his local copy to make sure that his changes had been committed.<p>It was discovered because of the discrepancy between his local working copy and the upstream copy. Which was checked not for security reasons, but because sometimes the two were out of sync. That&#x27;s all. Just dumb luck.<p>The sysadmins are still quite bitter about it. I know how it feels when your box is hacked and you really take it personally.<p>The code wasn&#x27;t added by hacking the CVS, as far as I remember, but rather through a hacked developer with commit rights.<p>that&#x27;s the story as I was told
评论 #38811735 未加载
评论 #38806346 未加载
评论 #38806587 未加载
评论 #38814810 未加载
评论 #38809265 未加载
评论 #38810925 未加载
评论 #38810791 未加载
ijustlovemathover 1 year ago
Another bit of cleverness not mentioned in the article is that assignment expressions always evaluate to the rvalue. So the expression `current-&gt;uid = 0` has the effect of making sure that entire conditional never actually runs (or at least, the return never runs), which means the overall behavior of wait4 doesn&#x27;t change in an observable way. Very clever if you&#x27;re trying to pass all of the existing tests
评论 #38807404 未加载
评论 #38806804 未加载
mmscover 1 year ago
Wasn&#x27;t this done by Ac1dB1tch3z? See <a href="http:&#x2F;&#x2F;phrack.org&#x2F;issues&#x2F;64&#x2F;15.html" rel="nofollow">http:&#x2F;&#x2F;phrack.org&#x2F;issues&#x2F;64&#x2F;15.html</a> for the CVS exploit from the same time.
评论 #38808086 未加载
评论 #38807407 未加载
评论 #38809298 未加载
评论 #38811491 未加载
a-dubover 1 year ago
it still seems kinda weird to me that all it takes to elevate privileges for a user process to &quot;can arbitrarily write system level memory or disk&quot; is just the clearing of all the bits of a single integer in kernel space which can be done by pretty much any execution path in the kernel.<p>it just seems like there could be a more tamper resistant mechanism around privilege elevations.
评论 #38811515 未加载
ngneerover 1 year ago
We used to use this as a cautionary tale in the CS department security course at the Technion. First, to highlight trust relationships in the &quot;supply chain&quot; (as the notion is now known in contemporary usage). Second, to pose the question of whether open source is inherently more trustworthy.
评论 #38807645 未加载
zhan_egover 1 year ago
Previous discussions - [1] [2]<p>[1] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=24106213">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=24106213</a><p>[2] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18173173">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18173173</a>
评论 #38809520 未加载
IshKebabover 1 year ago
I think the risk from this type of attack is probably near zero. You can&#x27;t hack into Github and add a commit to Linux.<p>Probably most of the deliberate backdoors that are present in Linux have been inserted by well funded state sponsored developers performing useful work. Easy to sneak a vulnerability in that way. (There was a controversial incident a few years ago when some researchers proved as much.)
评论 #38807957 未加载
robblbobblover 1 year ago
I&#x27;m pretty sure there are tons on unreleased and unpublished backdoor exploits for linux and windows likewise. The problem is you can&#x27;t fix them yourself if the signature keeps unknown to anyone.
评论 #38807676 未加载
charonn0over 1 year ago
&gt; it said &quot;= 0&quot; rather than &quot;== 0&quot;<p>Why do so many programming languages have different equals&#x2F;assigns operators?<p>There are languages that combine them and apparently don&#x27;t have any problems. Is it something to do with being strongly vs. weakly typed?
评论 #38809029 未加载
评论 #38807789 未加载
评论 #38807764 未加载
评论 #38808970 未加载
agilobover 1 year ago
This is a single example of an unsuccessful attempt to backdoor Linux. There were successful attempts too <a href="https:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;news&#x2F;security&#x2F;nsa-linked-bvp47-linux-backdoor-widely-undetected-for-10-years&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;news&#x2F;security&#x2F;nsa-linked-bv...</a>
评论 #38806124 未加载
aftbitover 1 year ago
While I&#x27;m here, does anyone know of a good trustworthy RAT for Windows machines that I can control from my Linux box? I have some relatives for whom I provide technical support. I&#x27;d love to just put an EXE on their desktop that would launch a VNC session and connect back to me (since they have the typical NAT + firewall of home users), but I don&#x27;t want to install a virus on their machines.
评论 #38806621 未加载
评论 #38811711 未加载
评论 #38807101 未加载
评论 #38811157 未加载
评论 #38807077 未加载
评论 #38808308 未加载