Menu
Use Linux? Stop what you're doing and apply this patch

Use Linux? Stop what you're doing and apply this patch

Man-in-the-middle attacks are just one possibility thanks to this new - but old - vulnerability

A buffer-overflow vulnerability uncovered Tuesday in the GNU C Library poses a serious threat to countless Linux users.

Dating back to the release of glibc 2.9 in 2008, CVE-2015-7547 is a stack-based buffer overflow bug in the glibc DNS client-side resolver that opens the door to remote code execution when a particular library function is used. Software using the function can be exploited with attacker-controlled domain names, attacker-controlled DNS servers or man-in-the-middle attacks.

Glibc, which was also at the core of the "Ghost" vulnerability found last year, is a C library that defines system calls and other basic functions on Linux systems. Its maintainers had apparently been alerted of the new problem last July, but it's not clear if any remediation effort was launched at that time.

Google and Red Hat independently reported the problem this week and a patch is now available.

"Our initial investigations showed that the issue affected all the versions of glibc since 2.9," Google explained in its Online Security Blog. "You should definitely update if you are on an older version, though. If the vulnerability is detected, machine owners may wish to take steps to mitigate the risk of an attack."

For those unable to patch immediately, Google has found some mitigations that may help prevent exploitation, including limiting response sizes accepted by the DNS resolver locally.

The company does not plan to release its exploit code, but it did release proof-of-concept code to help users determine if they're affected by the issue and verify any mitigations.

"The part that makes this interesting is that DNS is a core infrastructure component, which means that a lot of subsystems and applications could potentially be impacted," said Mark Loveless, a senior security researcher at Duo Security. "The main things listed initially were ssh, curl, wget and similar command-line Linux utilities, but it is possible that other processes could also use the library calls in the exact way needed for exploit."

In theory, other non-Windows systems that use glibc could be affected as well, Loveless added, including other Unix-based operating systems or even operating systems for mobile devices or tablets.

All Linux servers and Web frameworks such as Rails, PHP and Python are likely affected, as are Android apps running glibc, according to a post by Kaspersky Lab.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Google

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments