Take control of a Linux system on 70 second

Attackers take just over a minute to access Linux systems, holding down the Enter key for exactly 70 seconds. This particular hack gives them a root initramfs shell.

Simple exploit exists because of a bug in the Linux Unified Key Setup (LUKS) used by popular Linux distributions.
linux-bug

Let's say that with shell access, an attacker could decrypt systems. The attack also works on Linux cloud systems.

Debian and Fedora are two distributions that have been confirmed to be vulnerable to the problem.

The problem was identified by Hector Marco, a lecturer at University West of Scotland, along with assistant professor Ismael Ripoll from the Polytechnic University of Valencia. Researchers say the problem does not require a particular configuration of the system and they say:

This vulnerability allows [the hacker] to obtain a root initramfs shell on the affected systems. Vulnerability is very reliable, because it does not depend on specific systems or configurations.

Attackers can copy, modify, or destroy the hard drive as they create a network to export the data. Vulnerability is particularly severe in environments such as libraries, ATMs, airport machines, workshops, etc. where the entire boot process is protected by the BIOS password and GRUB and they have only one keyboard or a mouse.

The exploit has been repaired according to Marco and Ripoll.

http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html

iGuRu.gr The Best Technology Site in Greeceggns

Get the best viral stories straight into your inbox!















Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).