Tuesday, 1 December 2009

FreeBSD Root Exploit Zero Day

Way back when we worked on a grid project based on what was then a beta version of VIA’s “new” dual processor EPIA DP-310 series Mini-ITX embedded board.

As part of the pilot we put the grid together based on existing EPIA series embedded boards and signed an NDA with VIA to gain access to the then beta DP-310.

The grid OS was going to be FreeBSD.

Our goal was to put together an ultra low power consumption setup that would provide an excellent performance/watt value.

For us, the kybosh on the project ended up being VIA’s decision to kill the DP-310 product line altogether.

As a result, we still keep an eye on anything *BSD though it has been a while since we have loaded up either FreeBSD or OpenBSD due to time constraints.

It seems that there is a pretty deadly Zero Day vulnerability in FreeBSD that allows for full root.

Since a significant portion of the Internet’s backend runs on top of FreeBSD, this Zero Day has some pretty significant implications.

Philip Elder
Microsoft Small Business Specialists
Co-Author: SBS 2008 Blueprint Book

*Our original iMac was stolen (previous blog post). We now have a new MacBook Pro courtesy of Vlad Mazek, owner of OWN.

Windows Live Writer

1 comment:

Chris Knight said...

It's a local root exploit, so you need shell access to get the privilege escalation.
Remote exploit can only occur if you've really screwed over your configuration - like allowing unfettered system() calls through PHP.