[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Freepers Still Love war

Parody ... Jump / Trump --- van Halen jump

"The Democrat Meltdown Continues"

"Yes, We Need Deportations Without Due Process"

"Trump's Tariff Play Smart, Strategic, Working"

"Leftists Make Desperate Attempt to Discredit Photo of Abrego Garcia's MS-13 Tattoos. Here Are Receipts"

"Trump Administration Freezes $2 Billion After Harvard Refuses to Meet Demands"on After Harvard Refuses to Meet Demands

"Doctors Committing Insurance Fraud to Conceal Trans Procedures, Texas Children’s Whistleblower Testifies"

"Left Using '8647' Symbol for Violence Against Trump, Musk"

KawasakiÂ’s new rideable robohorse is straight out of a sci-fi novel

"Trade should work for America, not rule it"

"The Stakes Couldn’t Be Higher in Wisconsin’s Supreme Court Race – What’s at Risk for the GOP"

"How Trump caught big-government fans in their own trap"

‘Are You Prepared for Violence?’

Greek Orthodox Archbishop gives President Trump a Cross, tells him "Make America Invincible"

"Trump signs executive order eliminating the Department of Education!!!"

"If AOC Is the Democratic Future, the Party Is Even Worse Off Than We Think"

"Ending EPA Overreach"

Closest Look Ever at How Pyramids Were Built

Moment the SpaceX crew Meets Stranded ISS Crew

The Exodus Pharaoh EXPLAINED!

Did the Israelites Really Cross the Red Sea? Stunning Evidence of the Location of Red Sea Crossing!

Are we experiencing a Triumph of Orthodoxy?

Judge Napolitano with Konstantin Malofeev (Moscow, Russia)

"Trump Administration Cancels Most USAID Programs, Folds Others into State Department"

Introducing Manus: The General AI Agent

"Chinese Spies in Our Military? Straight to Jail"

Any suggestion that the USA and NATO are "Helping" or have ever helped Ukraine needs to be shot down instantly

"Real problem with the Palestinians: Nobody wants them"

ACDC & The Rolling Stones - Rock Me Baby

Magnus Carlsen gives a London System lesson!

"The Democrats Are Suffering Through a Drought of Generational Talent"

7 Tactics Of The Enemy To Weaken Your Faith

Strange And Biblical Events Are Happening

Every year ... BusiesT casino gambling day -- in Las Vegas

Trump’s DOGE Plan Is Legally Untouchable—Elon Musk Holds the Scalpel

Palestinians: What do you think of the Trump plan for Gaza?

What Happens Inside Gaza’s Secret Tunnels? | Unpacked

Hamas Torture Bodycam Footage: "These Monsters Filmed it All" | IDF Warfighter Doron Keidar, Ep. 225

EXPOSED: The Dark Truth About the Hostages in Gaza

New Task Force Ready To Expose Dark Secrets

Egypt Amasses Forces on Israel’s Southern Border | World War 3 About to Start?

"Trump wants to dismantle the Education Department. Here’s how it would work"

test

"Federal Workers Concerned That Returning To Office Will Interfere With Them Not Working"

"Yes, the Democrats Have a Governing Problem – They Blame America First, Then Govern Accordingly"

"Trump and His New Frenemies, Abroad and at Home"

"The Left’s Sin Is of Omission and Lost Opportunity"

"How Trump’s team will break down the woke bureaucracy"

Pete Hegseth will be confirmed in a few minutes


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: “Most serious” Linux privilege-escalation bug ever is under active exploit (updated)
Source: Ars Technica
URL Source: http://arstechnica.com/security/201 ... -ever-is-under-active-exploit/
Published: Oct 21, 2016
Author: Dan Goodin
Post Date: 2016-10-21 02:00:23 by nolu chan
Keywords: None
Views: 953
Comments: 1

“Most serious” Linux privilege-escalation bug ever is under active exploit (updated)

Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.

Dan Goodin - 10/20/2016, 3:20 PM
Ars Technica

A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system is under active exploit, according to researchers who are advising users to install a patch as soon as possible.

While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers are taking it extremely seriously. For one thing, it's not hard to develop exploits that work reliably. For another, the flaw is located in a section of the Linux kernel that's a part of virtually every distribution of the open-source OS released for almost a decade. What's more, researchers have discovered attack code that indicates the vulnerability is being actively and maliciously exploited in the wild.

"It's probably the most serious Linux local privilege escalation ever," Dan Rosenberg, a senior researcher at Azimuth Security, told Ars. "The nature of the vulnerability lends itself to extremely reliable exploitation. This vulnerability has been present for nine years, which is an extremely long period of time."

The underlying bug was patched this week by the maintainers of the official Linux kernel. Downstream distributors are in the process of releasing updates that incorporate the fix. Red Hat has classified the vulnerability as "important."

As their names describe, privilege-escalation or privilege-elevation vulnerabilities allow attackers with only limited access to a targeted computer to gain much greater control. The exploits can be used against Web hosting providers that provide shell access, so that one customer can attack other customers or even service administrators. Privilege-escalation exploits can also be combined with attacks that target other vulnerabilities. A SQL injection weakness in a website, for instance, often allows attackers to run malicious code only as an untrusted user. Combined with an escalation exploit, however, such attacks can often achieve highly coveted root status.

The in-the-wild attacks exploiting this specific vulnerability were found by Linux developer Phil Oester, according to an informational site dedicated to the vulnerability. It says Oester found the exploit using an HTTP packet capture, but the site doesn't elaborate.

[snip]

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: nolu chan (#0)

Downstream distributors are in the process of releasing updates that incorporate the fix.

Thanks for the info...

Willie Green  posted on  2016-10-21   8:55:50 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com