Forum Moderators: bakedjake

Message Too Old, No Replies

Linux "Dirty Cow" Exploit: Patch Your Systems Now

         

engine

11:27 am on Oct 21, 2016 (gmt 0)

WebmasterWorld Administrator 10+ Year Member Top Contributors Of The Month



Apparently, this bug has been around for nine years, and can allow attackers root access to the OS.
There is a patch [lkml.org...]

While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers are taking it extremely seriously. For one thing, it's not hard to develop exploits that work reliably. For another, the flaw is located in a section of the Linux kernel that's a part of virtually every distribution of the open-source OS released for almost a decade. What's more, researchers have discovered attack code that indicates the vulnerability is being actively and maliciously exploited in the wild. Linux "Dirty Cow" Exploit: Patch Your Systems Now [arstechnica.com]

lammert

2:04 pm on Oct 21, 2016 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Thanks for the heads up.

Looking at the description of the vulnerability, it can be triggered by anyone who runs a specially crafted executable on the servers. Service providers allowing shell access or uploading and executing executables by third parties must patch their system immediately. Pure website servers shouldn't be exploitable, unless someone manages to upload a file through the web interface and then executes that executable through another vulnerability.

bill

2:53 am on Oct 24, 2016 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I'm regularly patching my systems anyway. I think most of the repos should have this one by now.