• pedz@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    6 days ago

    It’s a good explanation and analysis of what it is and what it does.

    There’s just one thing that I didn’t see mentioned and it’s about the prevalence of having a software installed to extract rar files in the first place.

    AFAIK there’s nothing installed by default on Debian to open rar files. You kind of have to go out of your way to extract one. Unless this changed with the latest release.

    I’m not much of a distro hopper so I’d be curious to know, are there distributions where opening and extracting a rar file only requires to click it?

    • skaffi@infosec.pub
      link
      fedilink
      English
      arrow-up
      0
      ·
      6 days ago

      Isn’t that irrelevant? According to the article, the archive itself doesn’t contain any malicious code. Rather, it’s encoded in the file name, and can start executing itself when being parsed by the shell - no extraction needed.

      It seems to me that avoiding rar files, or limiting your ability to extract them will provide a false sense of security at best. Seems to me that this could be done using any file type at all.

      • pedz@lemmy.ca
        link
        fedilink
        arrow-up
        0
        ·
        6 days ago

        The starting point of the attack is an email message containing a RAR archive, which includes a file with a maliciously crafted file name: “ziliao2.pdf{echo,<Base64-encoded command>}|{base64,-d}|bash

        Doesn’t it mean that a rar archive contains the malicious file?

        It’s worth noting that simply extracting the file from the archive does not trigger execution. Rather, it occurs only when a shell script or command attempts to parse the file name.

        • skaffi@infosec.pub
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 days ago

          Right you are! I’m not sure how that went over my head. Eh, too much morning, too little coffee. Thanks for correcting me.

    • lime!@feddit.nu
      link
      fedilink
      English
      arrow-up
      0
      ·
      6 days ago

      7z can extract them, but i don’t know if it’s installed by default anywhere.

      • pedz@lemmy.ca
        link
        fedilink
        arrow-up
        0
        ·
        6 days ago

        I’ve been using Linux for more than 25 years and never had an antivirus. I’m also trying to just keep to official repos. From what I’ve seen over the years it’s not viruses or malware that are the most dangerous on Linux, but vulnerabilities found in some software, that usually only requires you to update your system.

        Maybe I’d be more careful if I was installing obscure packages from weird places, but I’m about as conservative as Debian when it comes to new software and bleeding edge, so usually the stuff that I install has been tried and tried again.

      • einkorn@feddit.org
        link
        fedilink
        arrow-up
        0
        ·
        6 days ago

        Well, recently there have been attacks on Arch based distros via poisened AUR packages.

        • whyNotSquirrel@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          6 days ago

          Isn’t Arch repo a little bit faster to accept packages? From what I understood the point was to make it easier to maintain a package therefore you have the most up to date software version, not sure if this was the problem or anything else, but I have doubt that Debian repositories could be poisoned like this

          • teawrecks@sopuli.xyz
            link
            fedilink
            arrow-up
            0
            ·
            6 days ago

            The Arch repos are completely different from the AUR. The Arch repos are officially maintained and tested. The AUR is where anyone can go upload a little pkgbuild script to make building and installing an arbitrary package as easy as possible.

            Arch’s package manager (pacman) does not work with the AUR. The AUR is basically a glorified pastebin. It’s a convenience for people who know what they’re doing, but you should not go downloading and executing files at random from there. Arch explicitly warns against doing this, and deliberately does not ship with any easy way to do this.

          • pontiffkitchen0@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            6 days ago

            Just in case you didn’t circle back, the other commenter is correct. Just like Debian repositories, Arch repositories also haven’t been poisoned like this . AUR has recently, but that’s equivalent of like on Debian adding 3rd party repos, but AUR is just a meta collection of those unofficial user repos basically. Arch documentation even warns against blindly installing from AUR, and to read the pkg build first since it’s basically the same thing as copy and pasting a curl command from a GitHub repo’s readme.