Kitz ADSL Broadband Information
adsl spacer  
Support this site
Home Broadband ISPs Tech Routers Wiki Forum
 
     
   Compare ISP   Rate your ISP
   Glossary   Glossary
 
Please login or register.

Login with username, password and session length
Advanced search  

News:

Author Topic: Linux root exploit due to memory access - Update 2  (Read 3450 times)

silversurfer44

  • Kitizen
  • ****
  • Posts: 4421
  • Lord Muck
    • Ben Novice Weather
Re: Linux root exploit due to memory access - Update 2
« Reply #1 on: January 24, 2012, 12:37:12 PM »

Not for months on end until an update is available.
Nice to know about these things though. I'm off to check my kernel release now.
Just update this morning.
Logged
Colin II : It's no good being a pessimist, it wouldn't work anyway.

silversurfer44

  • Kitizen
  • ****
  • Posts: 4421
  • Lord Muck
    • Ben Novice Weather
Re: Linux root exploit due to memory access - Update 2
« Reply #2 on: January 24, 2012, 12:40:54 PM »

I should be OK. I have 2.6.38.8
Logged
Colin II : It's no good being a pessimist, it wouldn't work anyway.

roseway

  • Administrator
  • Senior Kitizen
  • *
  • Posts: 43467
  • Penguins CAN fly
    • DSLstats
Re: Linux root exploit due to memory access - Update 2
« Reply #3 on: January 24, 2012, 01:25:59 PM »

Thanks for the information Adrian. It should be noted that this exploit is only available to someone who is already logged onto the system as a user, so it doesn't represent a threat of intrusion from outside (unless the security of the system has already been breached in some other way).
Logged
  Eric

asbokid

  • Kitizen
  • ****
  • Posts: 1286
    • Hacking the 2Wire
Re: Linux root exploit due to memory access - Update 2
« Reply #4 on: January 25, 2012, 01:30:26 PM »

Any flaw is unacceptable, but to my untrained eye, this one doesn't look very serious.

As Eric points out, the hacker must already have shell access on the machine.

If I'm reading things correctly [1]., this is how it works...


As with every exploit, the hacker wants to escalate his privileges to those of the 'root' (administrator) user.

To do that,  he needs access to the 'su' (superuser) program, or to another executable with its setuid bit set to root.

He runs that program, and using his 'sploit, he modifies the process memory and spawns his own process to gain a root shell.  That's quite a lot of requirements. 

I just noticed that Ubuntu 11.10 has automatically installed a new kernel.  Was that to rollout the patch for this?

The machine was running this:

Linux core2quad 3.0.0-12-generic #20-Ubuntu SMP Fri Oct 7 14:56:25 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux

Now it's running this..

Linux core2quad 3.0.0-15-generic #26-Ubuntu SMP Fri Jan 20 17:23:00 UTC 2012 x86_64 x86_64 x86_64 GNU/Linux

[1] http://blog.zx2c4.com/749
Logged
 

anything