Top 10 Linux/Unix Internet Security Vulnerabilities

    Date05 Nov 2003
    3273
    Posted ByAnthony Pell
    What aspects of Linux operating systems are most often targeted by malicious hackers? Here's a recent list of the ten most commonly exploited vulnerable services in UNIX and Linux, as compiled by federal security agencies, security vendors, and other . . . What aspects of Linux operating systems are most often targeted by malicious hackers? Here's a recent list of the ten most commonly exploited vulnerable services in UNIX and Linux, as compiled by federal security agencies, security vendors, and other experts.The list was compiled by federal security agencies in the US, the UK, and Singapore, as well as leading security software vendors and consulting firms; the top university-based security programs; many other user organizations; and the SANS Institute.

    "Although there are thousands of security incidents each year affecting these operating systems, the overwhelming majority of successful attacks target one or more of these vulnerable services," notes the SANS Institute. "Attackers are opportunistic. They take the easiest and most convenient route and exploit the best-known flaws with the most effective and widely available attack tools. They count on organizations not fixing the problems, and they often attack indiscriminately, scanning the Internet for any vulnerable systems. The easy and destructive spread of worms, such as Blaster, Slammer, and Code Red, can be traced directly to exploitation of unpatched vulnerabilities."

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.