You know where this thread is coming from, what the starting point
was.
It is exactly that, that obviously too much Linux admins believe that
Linux is secure by architecture or what else. It is obvious from my
investigations too, that the hackers/crackers get access to vulnerable
Linux hosts as unprivileged users and then using local exploits to
become root. I know, many Linux admins think local root exploits are
much less severe than remote root exploits. This is wrong and we now see
to what it leads, unfortunately.
Remote root is certainly nice.. however these days it is a lot more common to
gain access remotely via a process with drop'd privs.. You then have to find a
local exploit to escalate privileges.
Sometimes we get lucky and exploits in PHP come out where the exploit is
handled before privs are dropped.. and you get root. Other times in apache
exploits, you end up as the 'nobody' user.
However, I treat local vulnerabilities as serious as remote. While it's
definitely the smart thing to do to put your processes in jails, and make sure
they aren't running as root.. It's just not possible to completely not run as
root while the stack requires root privs to bind ports under 1024, and a few
other reasons (device access, etc).. Jails can be broken, etc.
The 'vulnerabilities' I don't worry about it.. are things like the
'info'
overflow that came out last week on Bugtraq. Is your 'info' binary suid root?
Do you give people 'sudo info' ? No.. Do I really care if someone injects
shellcode into their instance of info and drop to their own privs? not really.
But when you are talking about vulns in su, sudo, etc.. anything that is suid
on the system (On my server that doesn't run any X.. there is only a need for
4 suid bins total).
blah blah blah, security if a process.. blah blah, etc etc.
:P