Take control of a Linux system on 70 second

Attackers take just over a minute to access Linux systems, holding down the Enter key for exactly 70 seconds. This particular hack gives them a root initramfs shell.

Simple exploit exists because of a bug in the Linux Unified Key Setup (LUKS) used by popular Linux distributions.
linux-bug

Let's say that with shell access, an attacker could decrypt systems. The attack also works on Linux cloud systems.

Debian and Fedora are two distributions that have been confirmed to be vulnerable to the problem.

The problem was identified by Hector Marco, a lecturer at University West of Scotland, along with assistant professor Ismael Ripoll from the Polytechnic University of Valencia. Researchers say the problem does not require a particular configuration of the system and they say:

This vulnerability allows [the hacker] to obtain a root initramfs shell on the affected systems. Vulnerability is very reliable, because it does not depend on specific systems or configurations.

Attackers can copy, modify or destroy the hard drive, as well as create a network to extract the data. The vulnerability is particularly serious in environments such as libraries, ATMs, airport machines, laboratories, etc., where for the entire boot process the they are in the BIOS password and GRUB and have only one or both keyboards .

The exploit has been repaired according to Marco and Ripoll.

http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).