The Linux vulnerability series is more than '15 years old', allowing hackers to hijack root privileges
International security researchers recently found three flaws in the iSCSI subsystem of the Linux kernel. These are all critical flaws that, if successfully exploited, could allow a local attacker with basic user privileges to gain root privileges on affected Linux systems. Vulnerabilities are currently being tracked with identifiers CVE-2021-27365, CVE-2021-27363, and CVE-2021-27364.
Fortunately, these security flaws can only be exploited locally, meaning potential attackers will have to have direct access to vulnerable devices by exploiting another vulnerability. Or use an alternate attack vector.
15 years old Linux vulnerabilities
These three holes were discovered by researchers from the GRIMM security team. According to experts' estimates, the flaws have existed for no less than 15 years, most likely from the early stage of development of the iSCSI kernel subsystem in 2006.
According to GRIMM security researcher Adam Nichols, these three vulnerabilities affect all Linux distributions. Fortunately, the scsi_transport_iscsi kernel module that contains the vulnerability is not loaded by default.
However, depending on the Linux distribution targeted by attackers, this module can still be downloaded and exploited for privileged upgrades.
' Usually, the Linux kernel loads modules because the new hardware is discovered or because a module is found to be missing by a kernel function. The second case is more likely to be abused, and at the same time more susceptible to activation by an attacker, allowing them to expand the core's attack surface , '' Nichols said. ' On CentOS 8, RHEL 8 and Fedora systems, unprivileged users can automatically load the required modules if the rdma-core package is installed. Whereas on Debian and Ubuntu systems the rdma-core package will only automatically load the two required kernel modules if the RDMA hardware is available. Hence, the vulnerability has much more limited scope . '
Take up root privileges
An attacker can take advantage of the aforementioned vulnerabilities to bypass security features such as Kernel Address Space Layout Randomization (KASLR), Supervisor Mode Execution Protection (SMEP), Supervisor Mode Access Prevention (SMAP), and Kernel Page-Table Isolation (KPTI).
Essentially, these three vulnerabilities can lead to local privilege enhancement behavior, information leakage, and denial of service:
- CVE-2021-27365 : Heap buffer overflow (Local privilege upgrade, Information leak, Denial of service)
- CVE-2021-27363 : Kernel pointer leak (Information Leakage)
- CVE-2021-27364 : Out-of-bounds read (Information leakage, Denial of service)
All three vulnerabilities are currently fixed as of updates 5.11.4, 5.10.21, 5.4.103, 4.19.179, 4.14.224, 4.9.260, and 4.4.260, patches are available in the kernel. Linux mainline on 7th March. No fixes will be released for non-EOL supported kernel versions such as 3.x and 2.6.23.
If you have one of the above Linux kernel versions installed, your device will no longer be compromised in these three vulnerabilities.
You should read it
- Serious security vulnerability on Intel chips
- Forecast 2021: The world of security will be devastated by ransomware '
- SEO trend 2021 determines the success of SEO projects in 2021
- Found 37 security holes in VNC on Linux, Windows
- Detecting a new Linux vulnerability allows hackers to gain control of the VPN connection
- Detect a critical flaw in VMware Cloud Director, which could pave the way for hackers to take control of enterprise servers
- Warning: Jenkins exists a serious security hole that helps hackers gain control of computers of many Vietnamese businesses
- The basic steps in dealing with network security issues that you need to understand
May be interested
- Is root Android phone still a must-do?root android phones have become a part of smartphones since it became popular. with a rooted phone, you will have control over important system administration functions, allowing you to customize the device to a higher level.
- The DHCP vulnerability in Red Hat Linux helps hackers execute remote codesecurity researchers at google have discovered a serious remote command-line vulnerability on red hat linux's dhcp software and derivative versions of the fedora operating system.
- Serious vulnerability helps hackers attack Facebook accounts without the victim's actionscyber security expert samip aryal has just published information about a security vulnerability on this social network, allowing hackers to exploit victims' accounts without requiring any action from them.
- New privilege escalation vulnerability called 'Dirty Pipe' is threatening all Linux distrosrecently, security researcher max kellermann shared about a security flaw called 'dirty pipe'. it affects linux kernel 5.8 and above and even android devices.
- 12 Android applications have security holes, users should update immediatelysecurity vulnerabilities have been discovered in android applications and system components on xiaomi phones, allowing criminals to access arbitrary activities and services with system privileges, steal files...
- How to Change Root Password in Linuxthis tipsmake article shows how to change the root password in the linux operating system, applicable in cases where you remember your current password or cannot remember your root password.
- How to Get Root Rights on Ubuntuto perform administrator tasks on linux, you must have root access (super user or super user). having a separate root account is common on most linux distributions, but ubuntu disables super user permissions by default. this is to prevent you from accidentally causing errors and keep the system safe from suspicious intruders. to execute a command that requires root access, use sudo.
- How to install and use a vulnerability scanner in Linuxin this article, tipsmake.com will install openvas, an open source vulnerability scanning and management application, then run the first vulnerability scanning process.
- More than 40 Windows drivers contain dangerous privilege escalation vulnerabilitiesthere are more than 40 different drivers containing vulnerabilities that contain holes or poor code that can be exploited by hackers ...
- Hackers start using SambaCry to attack Linux computerssupposedly the wannacry linux version, sambacry exploits the vulnerability on the samba software that will cause linux users to start worrying.