SplashTop Linux Security Hole Discovered
Written by Michael Larabel in Free Software on 8 August 2008 at 04:54 PM EDT. 4 Comments
Less than two weeks ago we shared that SplashTop Linux was hacked to run off a USB stick, run custom applications, and more importantly having it run on non-certified motherboards (meaning those not sold by ASUS with SplashTop's instant-on Linux environment embedded). These hacks were done by members of our Phoronix Forums, but now a security hole has been discovered. Kano, a member of the Phoronix Forums and the mastermind behind the Debian-based Kanotix distribution, has discovered a serious security problem.

On at least some versions of this unique Linux distribution, contents of attached USB devices and Windows partitions are exposed via the network. If you're not running a router-based firewall (SplashTop has no firewall) or a dedicated hardware firewall, the contents can then be accessed anonymously. All of these files can be viewed over HTTP on port 1080.

Kano originally noted this problem in the Phoronix IRC channel and this forum thread. DeviceVM, the company behind SplashTop, is currently looking into this problem.

About The Author
Author picture

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter or contacted via MichaelLarabel.com.

Related Free Software News
Popular News
Trending Reviews & Featured Articles