DesktopLinux.com: Vulnerabilities to Unix/Linux would seem to only be able to proliferate in a situation where a user had root access. Is this true? (are there any example of non-root based exploits?)Keith Peer: At Central Command we are concerned over all malicious and potentially malicious programs and they do not need root access to cause damage. All that is need is write permission within the current users access rights even if it is just to the users /home directory. If a malicious program can execute and delete or infect anything within the contents of the current users /home directory it is dangerous enough. Typically when root access is needed it is to access a core Linux operating system component or to install a patch or some software application that requires root access. One of the problems is that as Linux moves on the corporate and consumer desktops the level of sophistication by the average user will go down significantly and then we will have millions and millions of people who will install/uninstall Linux applications daily and many under the root account. These people will never look at source code and if they did it would be meaningless to them. They would not know if the code is good, bad or malicious, they will just install it and try it. This is when Linux antivirus software will become very important, as important as it is today on Microsoft Windows computers.
http://www.desktoplinux.com/articles/AT3307459975.html* * * * * * * * * * * * * * * * * * * *
By BBC News Online internet reporter Mark WardVirus writers are starting to target web computers running the Linux operating system.
This week, many web servers running some versions of Linux have been infected with a malicious program that uses the computers as a springboard to spread itself around the internet.
Although not destructive, the virus program is inconveniencing many webmasters as it hogs resources while searching for new servers to infect.
Experts have warned Linux users to expect growing numbers of attacks as the operating system grows in popularity.
http://news.bbc.co.uk/1/hi/sci/tech/1123827.stm * * * * * * * * * * * * * * * * * * * *
The Truth about Linux VirusesOne the biggest vulnerabilities of the Linux system are the users who have the misconception that it cannot be infected by computer viruses. Several people believe that any non-Windows system is secure and doesn't need the aid of additional software to ward off viruses. This is far from the truth and a major reason why more viruses are being written for the system.
Many security experts believe that the growth in Linux malware is the result of its evolution and popularity, particularly as a desktop system. Shane Coursen, a senior technical consultant for Kasperky Lab, believes that more users are turning to Linux because of the interest in learning how to write malware for the system.
Most viruses written for Linux pose a potential, yet minimal threat to the system. If a virus infected binary file is run, the entire system could be infected. The distribution of the infection depends on which particular user with what level of privileges executed the binary. A binary run under the systems root account would have the ability to infect the entire system.
http://www.spamlaws.com/first-linux-virus.html~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I stand by what I said. Linux is slowly going main stream. Someday it will reach the tipping point. While it is much more secure than Windows, more and more users are non-techies. This is also part of the Window security problem. There will be problems with viruses and Trojans with Lunix. Bet on it.