New privilege escalation vulnerability called 'Dirty Pipe' is threatening all Linux distros
"Dirty Pipe" is tracked under code CVE-2022-0847. When exploited successfully, an unprivileged hacker can insert and overwrite data in read-only files, including SUID processes running as root.
Kellermann discovered this vulnerability after tracking a bug that was corrupting the web server access logs of one of his customers.
Kellermann said "Dirty Pipe" is similar to the Dirty COW vulnerability (CVE-2016-5195) that was patched in 2016.
How to exploit root access has been shared publicly
In his sharing, Kellermann also publicly disclosed how to exploit the vulnerability. In this way, local users can put their own data in sensitive read-only files, remove restrictions, or modify configurations to provide greater access than they normally would. .
For example, security researcher Phith0n exploited this vulnerability to fix the /etc/passwd file so that the root account no longer had a password. After this change is done, unprivileged users just need to execute the command "su root" to get access to the root account,
Several other exploits were also made public soon after.
What do users need to do?
Before going public about "Dirty Pipe", Kellermann reported it to the organizations responsible for the maintenance of Linux distros, including the Linux kernel security group and the Android Security Team.
Currently, this vulnerability has been fixed in Linux kernels 5.16.11, 5.15.25 and 5.10.102 but many servers are still running unpatched kernels. Therefore, exploiting a publicly shared vulnerability will cause many problems for server administrators.
Moreover, because the exploitation is so easy and the root access is so simple, it's only a matter of time before this vulnerability is abused by hackers in cyber attacks. Previously, the Dirty COW vulnerability, although more difficult to exploit, was still abused by hackers.
Web hosting providers that provide Linux shell access or universities that typically provide shell access for multi-user Linux systems will have to pay special attention to this Dirty Pipe vulnerability.
You should read it
- Immediately patch CWP vulnerability that allows code execution as root on Linux servers
- How to install and use a vulnerability scanner in Linux
- GitLab patches critical vulnerability that allows hackers to take control of accounts
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
- Log4Shell zero-day vulnerability discovered, the new nightmare of enterprises
- The DHCP vulnerability in Red Hat Linux helps hackers execute remote code
- Linux kernel vulnerability exposes Stack memory, causing local data leak
- Google Project Zero reveals a serious privilege escalation vulnerability in Windows
May be interested
- Linux distro for new, easy to use, beautifulunlike windows or mac, linux has multiple versions with different names. if you are new to this operating system, you will be lost between countless versions and wondering what version of linux to start using?
- Which Linux distros will Windows 10 put into Windows 10?microsoft is trying to support linux by announcing three of the most popular linux distros will be available in the windows store. that means ubuntu, fedora and opensuse will soon appear in windows 10.
- Serious vulnerability in OpenSSH threatens millions of serversaccording to techradar, a serious security vulnerability called 'regresshion' (cve-2024-6387) has existed in openssh for more than 4 years and is threatening many servers around the world.
- Microsoft officially submitted an application to join 'Linux secretion'.if they are included in this 'secret society', microsoft will have early access to linux-related security vulnerabilities.
- Detecting a new Linux vulnerability allows hackers to gain control of the VPN connectioninternational security researchers have found an entirely new linux vulnerability that allows potential attackers to hijack vpn connections on the device * nix and 'inject' the arbitrary data payload into it. tcp4 and ipv6 streams.
- Immediately patch CWP vulnerability that allows code execution as root on Linux serverssecurity researchers have discovered two new vulnerabilities affecting control web panel (cwp) software. hackers could chain these two vulnerabilities to gain remote code execution (rce) privileges as root on vulnerable linux servers.
- 12-year vulnerability in pkexec gives hackers root privileges on Linuxresearchers have just issued a warning about a vulnerability in polkit's pkexec component that is assigned the code cve-2021-4034 (and is known as pwnkit).
- Filter and Pipe in Unix / Linuxyou can connect two commands together so that the output of a program is the input of the next program. two or more commands connected in this way form a pipe.
- How to install and use a vulnerability scanner in Linuxin this article, tipsmake.com will install openvas, an open source vulnerability scanning and management application, then run the first vulnerability scanning process.
- 8 best Linux distros for pentestlinux users have a lot of free operating systems to choose from when it comes to pentests. if you're a linux user, it's time to check out some of these cybersecurity-related linux distributions.