The Linux machine can be remotely hacked with a poisoned DNS response
CVE-2017-9445 flaw, in dns_packet_new function of systemd-resolved, a DNS response processing component provides the network name for the local application on the machine. A malicious DNS response can cause systemd-resolved to crash remotely when the system tries to find hostnames on the DNS service that has been controlled by an attacker.
Finally, too large DNS responses will cause buffer overflow, allowing an attacker to override the memory and lead to remote code execution. This means an attacker can run any malware remotely on the target computer or server via malicious DNS.
Hack Linux machines through poisoned DNS feedback
'On systemd through 233, a certain size passing dns_packet_new in systemd-resolved can cause overflow because it's too small,' explains Chris Coulson, Ubuntu developer at Canonical. 'Poisoned DNS server can exploit this by responding to the modified payload with TCP protocol to deceive systemd-resolved buffer distribution too small and then write random data of course. '
This vulnerability came from Systemd version 223 introduced in June 2015 and is still there until now, including the Systemd 233 release in March this year. System-resolved course must run on a new system that can be exploited.
This error is available in Ubuntu versions 17.04 and 16.10, Debian version Stretch (or Debian 9.0), Buster (or 10) and SId (or Unstable) and many other Linux systems using Systemd. Security patches have been released to solve the problem, so users and system administrators are encouraged to install and update as soon as possible.
You should read it
- The interesting mystery behind how to put code names and numbers of famous Linux distributions, you know?
- What is ARP Poisoning Attack? What can be done to prevent?
- Your Linux system can be hacked just by opening a file in Vim or Neovim Editor
- Hackers start using SambaCry to attack Linux computers
- How to use the which command in Linux
- How to make the script executable anywhere in Linux
- This USB cable can turn a normal Linux laptop into a 'brick'.
- The DHCP vulnerability in Red Hat Linux helps hackers execute remote code
May be interested
- World's fastest robot boxer, response delay less than 1/15 blink timethe qibbot robot, developed by qibo robot company in shandong province, china, which simulates the real movements of a boxer, can be controlled remotely with a response delay of just 12 milliseconds, less than 1/15 of the time
- Response (Response) in HTTPafter receiving and interpreting a request message, a server sends a response signal with an http response message.
- How to Install KVM in Arch Linux and Configure Virtual Machinesetting up a new virtual machine on arch linux using kvm and qemu can seem daunting. but fret not, as it will be very easy to learn how to do it.
- How to manage remote Linux server using SSHmanaging the server is still a necessary and sometimes heavy task. fortunately, secure shell (ssh) is available - a network protocol that allows services to run on an unsecured network.
- Even ships are capable of being hacked remotelytypically, large ships and aircraft will be equipped with vsat systems, allowing crews to send, receive messages and access the internet during the trip. however, is this system really safe? read the article below for more details!
- How to check which devices are logged into Facebook and how to remotely exitfor facebook accounts, the security is very important because if not careful, it is easy for facebook accounts to be hacked and used for malicious purposes. however, if you are concerned about security, it will never happen because facebook shows you the devices that you have logged in and allowed to log out remotely.
- Signs show clearly that your system is being hackedif an email requests any sensitive information such as your address, bank account, social security number, or even the date of birth, chances are it's a fake email.
- What is Incident Response Retainer (IRR)?all businesses face cyber attacks. when successful, they not only cause disruption, but also allow cybercriminals to steal personal information, which can harm both businesses and their customers.
- How to Enable the Windows Subsystem for Linuxfinally! linux on windows is here! with an up to date windows 10 machine, it's easy to get an ubuntu linux subsystem running on your windows machine. with the ubuntu subsystem, you will be able to use common linux tools, such as grep, awk,...
- What parameters Response Time on the computer screen, TV mean?when you buy a new computer screen, you will see that there is information about response time. so what does response time mean here? how important is it to computer monitors in general?