Researchers at Cloud Security Company, Qualys, Have Discovered a Major Security Hole, "GHOST" (CVE-2015-0235), in the Linux GNU C Library (glibc). This Vulnerability Enables Hackers to Remotely Take Control of Systems without Even Knowing any System IDs or Passwords.
Qualys Alerted the Major Linux Distributors about the Security Hole Quickly and Most Have Now Released Patches for it. Josh Bressers, Manager of the Red Hat Product Security Team Said in an Interview that, "Red Hat got word of this about a week ago. Updates to fix GHOST on Red Hat Enterprise Linux (RHEL) 5, 6 and 7 are now available via the Red Hat Network". This Hole Exists in any Linux System that was Built with glibc-2.2, which was Released on November 10, 2000. Qualys Found that, the Bug had actually been Patched with a Minor Bug Fix Released on May 21, 2013 between the Releases of glibc-2.17 and glibc-2.18. However, this Fix Wasn't Classified as a Security Problem and as a Result, Many Stable and Long-Term-Support Distributions are Wide Open Today.
Linux Systems that are Liable to Attack include Debian 7 (Wheezy), RHEL 5, 6 and 7, CentOS 6 and 7 and Ubuntu 12.04. Besides Red Hat's Fix, Debian is currently Repairing its Core Distributions, Ubuntu has Patched the Bug Both for 12.04 and the Older 10.04 and I'm Told the Patches are on their Way for CentOS.
The Security Hole Can be Triggered by Exploiting glibc's gethostbyname Functions. This Function is Used on Almost All Networked Linux Computers, When the Computer is Called on to Access Another Networked Computer either by Using the /etc/hosts Files or, More Commonly, by Resolving an Internet Domain Name with Domain Name System (DNS).
To Exploit this Vulnerability, All an Attacker Needs to do, is Trigger a Buffer Overflow by Using an Invalid Hostname Argument to an Application that Performs a DNS Resolution. This Vulnerability then Enables a Remote Attacker to Execute Arbitrary Code with the Permissions of the User Running DNS. In Short, Once an Attacker has Exploited "GHOST", they May be Capable of Taking over the System.
"GHOST poses a remote code execution risk that makes it incredibly easy for an attacker to exploit a machine. For example, an attacker could send a simple email on a Linux-based system and automatically get complete access to that machine", Said Wolfgang Kandek, Qualys's CTO in a Statement. "Given the sheer number of systems based on glibc, we believe this is a high severity vulnerability and should be addressed immediately. The best course of action to mitigate the risk is to apply a patch from your Linux vendor."
Unlike Some Security Announcements, Kandek is Not Crying Wolf. Qualys has Developed a Proof-of-Concept in which Simply Sending a Specially Created Email to a Mail Server Enabled them to Create a Remote Shell to the Linux Machine. According to Qualys, "This bypasses all existing protections (like ASLR, PIE and NX) on both 32-bit and 64-bit systems". My Advice to you is to Now, Not Later Today, Now, Update your Linux System as Soon as Possible. After Patching it, you Should then Reboot the System. I Know for Linux it's Rarely Needed to Reboot but, since gethostbyname is Called on by so Many Core Processes, such as auditd, dbus-daem, dhclient, init, master, mysqld, rsyslogd, sshd, udevd and xinetd, you Want to Make Absolutely Sure that, All your System's Running Programs are Using the Patched Code.
Info Sources:
https://www.qualys.com
http://www.openwall.com/lists/oss-security/2015/01/27/9
https://access.redhat.com/articles/1332213
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776391
http://www.ubuntu.com/usn/usn-2485-1
http://www.gnu.org/software/libc/manual/html_node/Host-Names.html
https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability
sexta-feira, 30 de janeiro de 2015
"GHOST", a Critical Linux Security Hole, is Revealed
14:14
No comments
0 comentários:
Enviar um comentário