The Linux machine can be remotely hacked with a poisoned DNS response
CVE-2017-9445 flaw, in dns_packet_new function of systemd-resolved, a DNS response processing component provides the network name for the local application on the machine. A malicious DNS response can cause systemd-resolved to crash remotely when the system tries to find hostnames on the DNS service that has been controlled by an attacker.
Finally, too large DNS responses will cause buffer overflow, allowing an attacker to override the memory and lead to remote code execution. This means an attacker can run any malware remotely on the target computer or server via malicious DNS.
Hack Linux machines through poisoned DNS feedback
'On systemd through 233, a certain size passing dns_packet_new in systemd-resolved can cause overflow because it's too small,' explains Chris Coulson, Ubuntu developer at Canonical. 'Poisoned DNS server can exploit this by responding to the modified payload with TCP protocol to deceive systemd-resolved buffer distribution too small and then write random data of course. '
This vulnerability came from Systemd version 223 introduced in June 2015 and is still there until now, including the Systemd 233 release in March this year. System-resolved course must run on a new system that can be exploited.
This error is available in Ubuntu versions 17.04 and 16.10, Debian version Stretch (or Debian 9.0), Buster (or 10) and SId (or Unstable) and many other Linux systems using Systemd. Security patches have been released to solve the problem, so users and system administrators are encouraged to install and update as soon as possible.
You should read it
- The interesting mystery behind how to put code names and numbers of famous Linux distributions, you know?
- What is ARP Poisoning Attack? What can be done to prevent?
- Your Linux system can be hacked just by opening a file in Vim or Neovim Editor
- Hackers start using SambaCry to attack Linux computers
- How to use the which command in Linux
- How to make the script executable anywhere in Linux
- This USB cable can turn a normal Linux laptop into a 'brick'.
- The DHCP vulnerability in Red Hat Linux helps hackers execute remote code
May be interested
- How to hack Gmail's two-step authenticationtwo-factor authentication does not mean that you are absolutely safe against phishing attackers.
- Samsung Flow can be used on Windows 10 computersinterested users have also heard that samsung is updating the samsung flow application so everyone can use it on windows 10 pc.
- Research shows that just getting a smartphone close by can make you 'more foolish'.a recent study shows that just getting a smartphone close to you makes you more foolish. invite you to learn the reason behind it!
- The researchers successfully cracked 1024-bit RSA in GnuPG Crypto Librarysecurity researchers have discovered an important flaw in the gnupg cryptographic library that completely disables 1024-bit rsa and successfully retrieves the rsa secret key to decrypt the data.
- Why will AirPods finally be available in the iPhone box?what if in the future, the apple product is completely wireless, and you still use headphopne with a 3.5mm jack?
- Look back at the 9 photos of 'ducking swans' of the phone after 80 yearslet us take a look back at the 9 swan photos of the phone after 80 years in the article below!