Menu
Use Linux? Stop what you're doing and apply this patch

Use Linux? Stop what you're doing and apply this patch

Man-in-the-middle attacks are just one possibility thanks to this new - but old - vulnerability

A buffer-overflow vulnerability uncovered Tuesday in the GNU C Library poses a serious threat to countless Linux users.

Dating back to the release of glibc 2.9 in 2008, CVE-2015-7547 is a stack-based buffer overflow bug in the glibc DNS client-side resolver that opens the door to remote code execution when a particular library function is used. Software using the function can be exploited with attacker-controlled domain names, attacker-controlled DNS servers or man-in-the-middle attacks.

Glibc, which was also at the core of the "Ghost" vulnerability found last year, is a C library that defines system calls and other basic functions on Linux systems. Its maintainers had apparently been alerted of the new problem last July, but it's not clear if any remediation effort was launched at that time.

Google and Red Hat independently reported the problem this week and a patch is now available.

"Our initial investigations showed that the issue affected all the versions of glibc since 2.9," Google explained in its Online Security Blog. "You should definitely update if you are on an older version, though. If the vulnerability is detected, machine owners may wish to take steps to mitigate the risk of an attack."

For those unable to patch immediately, Google has found some mitigations that may help prevent exploitation, including limiting response sizes accepted by the DNS resolver locally.

The company does not plan to release its exploit code, but it did release proof-of-concept code to help users determine if they're affected by the issue and verify any mitigations.

"The part that makes this interesting is that DNS is a core infrastructure component, which means that a lot of subsystems and applications could potentially be impacted," said Mark Loveless, a senior security researcher at Duo Security. "The main things listed initially were ssh, curl, wget and similar command-line Linux utilities, but it is possible that other processes could also use the library calls in the exact way needed for exploit."

In theory, other non-Windows systems that use glibc could be affected as well, Loveless added, including other Unix-based operating systems or even operating systems for mobile devices or tablets.

All Linux servers and Web frameworks such as Rails, PHP and Python are likely affected, as are Android apps running glibc, according to a post by Kaspersky Lab.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Google

Featured

Slideshows

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Show Comments