Are most Linux systems that allow non-root users to execute code straightforwardly rootable?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
3
down vote

favorite
1













long story short if you can execute code on a box it is usually straightforward to get root




(quote source)



The immediate implication of this quote (if it's accurate) is that if you're running a multi-user system and don't try your darndest to prevent all users from creating files with x permission set the system is as good as compromised. The corollary is that operating a multi-user system, such as ones typically found in universities, that by design allow all students to do exercises in C, C++, assembly etc, is pointless, since any student can straightforwardly root this system.



Since running computer systems intended to be used by more people than their owners is not considered pointless and privilege limiting facilities (users' rights management, sandboxing, etc etc) are not considered useless, I somehow doubt this kinds of comments. But what can I know?



Is it true that most Linux systems are straightforwardly rootable by anyone who can execute code on them?










share|improve this question

























    up vote
    3
    down vote

    favorite
    1













    long story short if you can execute code on a box it is usually straightforward to get root




    (quote source)



    The immediate implication of this quote (if it's accurate) is that if you're running a multi-user system and don't try your darndest to prevent all users from creating files with x permission set the system is as good as compromised. The corollary is that operating a multi-user system, such as ones typically found in universities, that by design allow all students to do exercises in C, C++, assembly etc, is pointless, since any student can straightforwardly root this system.



    Since running computer systems intended to be used by more people than their owners is not considered pointless and privilege limiting facilities (users' rights management, sandboxing, etc etc) are not considered useless, I somehow doubt this kinds of comments. But what can I know?



    Is it true that most Linux systems are straightforwardly rootable by anyone who can execute code on them?










    share|improve this question























      up vote
      3
      down vote

      favorite
      1









      up vote
      3
      down vote

      favorite
      1






      1






      long story short if you can execute code on a box it is usually straightforward to get root




      (quote source)



      The immediate implication of this quote (if it's accurate) is that if you're running a multi-user system and don't try your darndest to prevent all users from creating files with x permission set the system is as good as compromised. The corollary is that operating a multi-user system, such as ones typically found in universities, that by design allow all students to do exercises in C, C++, assembly etc, is pointless, since any student can straightforwardly root this system.



      Since running computer systems intended to be used by more people than their owners is not considered pointless and privilege limiting facilities (users' rights management, sandboxing, etc etc) are not considered useless, I somehow doubt this kinds of comments. But what can I know?



      Is it true that most Linux systems are straightforwardly rootable by anyone who can execute code on them?










      share|improve this question














      long story short if you can execute code on a box it is usually straightforward to get root




      (quote source)



      The immediate implication of this quote (if it's accurate) is that if you're running a multi-user system and don't try your darndest to prevent all users from creating files with x permission set the system is as good as compromised. The corollary is that operating a multi-user system, such as ones typically found in universities, that by design allow all students to do exercises in C, C++, assembly etc, is pointless, since any student can straightforwardly root this system.



      Since running computer systems intended to be used by more people than their owners is not considered pointless and privilege limiting facilities (users' rights management, sandboxing, etc etc) are not considered useless, I somehow doubt this kinds of comments. But what can I know?



      Is it true that most Linux systems are straightforwardly rootable by anyone who can execute code on them?







      linux root






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked 2 hours ago









      gaazkam

      8831612




      8831612




















          1 Answer
          1






          active

          oldest

          votes

















          up vote
          6
          down vote













          No, this is not correct. While one may argue about the relative difficulty of finding and exploiting 0day vulnerabilities on Linux when you have local access, the security architecture itself of a modern Linux system (with an MMU) is designed to isolate different users and prevent privilege escalation. A non-root user cannot gain root without proper authorization without exploiting an extant vulnerability, and such privilege escalation vulnerabilities are very quickly patched as soon as they are discovered.



          It is possible, however, to abuse the human factor and gain root by exploiting common misconceptions ubiquitous to the sysadmin profession. For example, if you use sudo to elevate privileges to root from an untrusted user, then that untrusted user can log keystrokes made and obtain the root password. Since many sysadmins routinely abuse sudo in this way, you could say that it is straightforward to root a Linux box once you have unprivileged local code execution. This is, however, dependent on the sysadmin not understanding the security architecture of their system. A few other examples:



          • Tricking a sysadmin into running ldd on a malicious static executable as root.


          • Dropping down to a lesser user from root, allowing a TTY pushback attack.






          share|improve this answer






















            Your Answer







            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "162"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            convertImagesToLinks: false,
            noModals: false,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













             

            draft saved


            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f196664%2fare-most-linux-systems-that-allow-non-root-users-to-execute-code-straightforward%23new-answer', 'question_page');

            );

            Post as a guest






























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            6
            down vote













            No, this is not correct. While one may argue about the relative difficulty of finding and exploiting 0day vulnerabilities on Linux when you have local access, the security architecture itself of a modern Linux system (with an MMU) is designed to isolate different users and prevent privilege escalation. A non-root user cannot gain root without proper authorization without exploiting an extant vulnerability, and such privilege escalation vulnerabilities are very quickly patched as soon as they are discovered.



            It is possible, however, to abuse the human factor and gain root by exploiting common misconceptions ubiquitous to the sysadmin profession. For example, if you use sudo to elevate privileges to root from an untrusted user, then that untrusted user can log keystrokes made and obtain the root password. Since many sysadmins routinely abuse sudo in this way, you could say that it is straightforward to root a Linux box once you have unprivileged local code execution. This is, however, dependent on the sysadmin not understanding the security architecture of their system. A few other examples:



            • Tricking a sysadmin into running ldd on a malicious static executable as root.


            • Dropping down to a lesser user from root, allowing a TTY pushback attack.






            share|improve this answer


























              up vote
              6
              down vote













              No, this is not correct. While one may argue about the relative difficulty of finding and exploiting 0day vulnerabilities on Linux when you have local access, the security architecture itself of a modern Linux system (with an MMU) is designed to isolate different users and prevent privilege escalation. A non-root user cannot gain root without proper authorization without exploiting an extant vulnerability, and such privilege escalation vulnerabilities are very quickly patched as soon as they are discovered.



              It is possible, however, to abuse the human factor and gain root by exploiting common misconceptions ubiquitous to the sysadmin profession. For example, if you use sudo to elevate privileges to root from an untrusted user, then that untrusted user can log keystrokes made and obtain the root password. Since many sysadmins routinely abuse sudo in this way, you could say that it is straightforward to root a Linux box once you have unprivileged local code execution. This is, however, dependent on the sysadmin not understanding the security architecture of their system. A few other examples:



              • Tricking a sysadmin into running ldd on a malicious static executable as root.


              • Dropping down to a lesser user from root, allowing a TTY pushback attack.






              share|improve this answer
























                up vote
                6
                down vote










                up vote
                6
                down vote









                No, this is not correct. While one may argue about the relative difficulty of finding and exploiting 0day vulnerabilities on Linux when you have local access, the security architecture itself of a modern Linux system (with an MMU) is designed to isolate different users and prevent privilege escalation. A non-root user cannot gain root without proper authorization without exploiting an extant vulnerability, and such privilege escalation vulnerabilities are very quickly patched as soon as they are discovered.



                It is possible, however, to abuse the human factor and gain root by exploiting common misconceptions ubiquitous to the sysadmin profession. For example, if you use sudo to elevate privileges to root from an untrusted user, then that untrusted user can log keystrokes made and obtain the root password. Since many sysadmins routinely abuse sudo in this way, you could say that it is straightforward to root a Linux box once you have unprivileged local code execution. This is, however, dependent on the sysadmin not understanding the security architecture of their system. A few other examples:



                • Tricking a sysadmin into running ldd on a malicious static executable as root.


                • Dropping down to a lesser user from root, allowing a TTY pushback attack.






                share|improve this answer














                No, this is not correct. While one may argue about the relative difficulty of finding and exploiting 0day vulnerabilities on Linux when you have local access, the security architecture itself of a modern Linux system (with an MMU) is designed to isolate different users and prevent privilege escalation. A non-root user cannot gain root without proper authorization without exploiting an extant vulnerability, and such privilege escalation vulnerabilities are very quickly patched as soon as they are discovered.



                It is possible, however, to abuse the human factor and gain root by exploiting common misconceptions ubiquitous to the sysadmin profession. For example, if you use sudo to elevate privileges to root from an untrusted user, then that untrusted user can log keystrokes made and obtain the root password. Since many sysadmins routinely abuse sudo in this way, you could say that it is straightforward to root a Linux box once you have unprivileged local code execution. This is, however, dependent on the sysadmin not understanding the security architecture of their system. A few other examples:



                • Tricking a sysadmin into running ldd on a malicious static executable as root.


                • Dropping down to a lesser user from root, allowing a TTY pushback attack.







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited 1 hour ago

























                answered 1 hour ago









                forest

                24.2k127491




                24.2k127491



























                     

                    draft saved


                    draft discarded















































                     


                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f196664%2fare-most-linux-systems-that-allow-non-root-users-to-execute-code-straightforward%23new-answer', 'question_page');

                    );

                    Post as a guest













































































                    Popular posts from this blog

                    How to check contact read email or not when send email to Individual?

                    Displaying single band from multi-band raster using QGIS

                    How many registers does an x86_64 CPU actually have?