Anybody want to talk about Dirty Cow?


 
Thread Tools Search this Thread
The Lounge What is on Your Mind? Anybody want to talk about Dirty Cow?
# 1  
Old 10-22-2016
Anybody want to talk about Dirty Cow?

Hi All,

How worried is everyone about the Dirty Cow Linux exploit? Has anybody experienced attacks yet?

From the research I've done it seems that the exploit is "reliable" (that is it works nearly every time on vulverable systems) which is not good news.

We all believe that Unix/Linux systems are so much more secure than Windows because they're not targeted in the same way.

Q: Anybody have up to date knowledge as to which distros have now been patched and which are still at risk?

Thanks,

Dennis.

Last edited by hicksd8; 10-22-2016 at 12:18 PM..
This User Gave Thanks to hicksd8 For This Post:
# 2  
Old 10-25-2016
Firstly take a look here:-

dirtycow.github.io/dirtyc0w.c at master * dirtycow/dirtycow.github.io * GitHub

Next this one could be even worse as the user numbers are much more to be able to target...
Make sute you watch the video; free software anyone? OUCH!

Using Rowhammer bitflips to root Android phones is now a thing | Ars Technica
This User Gave Thanks to wisecracker For This Post:
# 3  
Old 10-25-2016
Here's a news clip from the UK. (BBC Copyright acknowledged)

Users of the Linux operating system are being urged to update it to remove a "serious" bug that hackers could use to hijack systems.
Known as the Dirty Cow bug, the vulnerability has been present in many versions of Linux for almost a decade.
The warnings come as malicious hackers start exploiting it to take over vulnerable computers.
The vulnerability gets its name from the Linux sub-system, called Copy-On-Write or COW, in which it appears.
Updated versions of Linux that no longer suffer the bug are now being widely distributed. Millions of computers, including a majority of web servers, run Linux or one of its variants.


"The nature of the vulnerability lends itself to extremely reliable exploitation," Dan Rosenberg, a security researcher at Azimuth Security, told tech news site Ars Technica. He added that it was the "most serious" bug of its type ever found in Linux.
The vulnerability allows attackers to steadily increase the amount of control they can exert over a target system.
Security expert Graham Cluley said the bug was of a type that did not normally prompt action because they were less likely to be exploited. However, he said, Dirty Cow should be taken seriously because there was some evidence that it was being actively abused.
Attack code that capitalised on the weakly protected sub-system was captured by developer Phil Oester as it was used in an attempt to take over a server he runs.
Mr Oester told the V3 tech news site that the vulnerability was easy to use and was "almost certain" to be more widely used by cyberthieves.
# 4  
Old 10-25-2016
The thing is that according to RedHat the attacker has to be a local user, which implies that you know the local user, with unprivileged access. It does not say whether that user is allowed to execute code loaded from an external source, e.g. USB memory stick...
As I am not a professional I must assume that standard users are NOT allowed only admin' staff.

CVE-2016-5195 - Red Hat Customer Portal

However, and to me this is a big however, the Rowhammer _bug_ is much more serious as it can be buried inside a """free""" app' that could be DLed from so-called reputable sources and be stealthily called or installed inside what looks like a _cool_ app'. NASTY!

As we all know race conditions occur all the time in both HW and/or SW.
I had the condition(s) on both the AMIGA1200 and PC parallel ports when accessing HW I built many years ago so I am aware of situations like this. Obviously these were not OS crippling events but they taught me a lot and to research more about the situation.

Current technology is frighteningly quick compared to those units of yesteryear so even nanoseconds can be the breakpoint of today's HW...

I can't find any test code for Rowhammer though to see how it works... ;o(

...But I could guess though and probably be close enough without any said test code.
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Linux

Broadcom under Fedora 18 (Spherical Cow)

So I'm having a problem getting a Broadcom BCM4312 wireless controller to work under the broadcom-wl module $uname Linux 3.8.11-200.fc18.x86_64 #1 SMP Wed May 1 19:44:27 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux lspci -v 05:00.0 Network controller: Broadcom Corporation BCM4312 802.11b/g... (2 Replies)
Discussion started by: Skrynesaver
2 Replies

2. UNIX for Advanced & Expert Users

Superblock marked dirty

Good morning! I met a problem on a FS with AIX 5.3 It's not possible to mount the FS because of a dirty superblock. I tried few things without success. I need your help to solve my problem guys. Do you have any idea please? Thanks a lot drp01,/home/root # mount /GSPRES/data Replaying... (9 Replies)
Discussion started by: Castelior
9 Replies

3. Shell Programming and Scripting

Need a quick and dirty solution

I have a list of multiple versions of software. The list is formated as follows: NAME VERSION I simply need to pull out the highest version of each software, for example: Original File a v1.0 a v1.1 a v1.2 b v2.1 b v2.2 b v2.21 b v3.0 Output a v1.2 b v3.0 (13 Replies)
Discussion started by: Finja
13 Replies

4. Shell Programming and Scripting

noob question - is awk the tool to clean dirty text files?

Hi, nevermind. I think I've found the answer. It appears I was looking for index, match, sub, and gsub. I want to write a shell script that will clean the html out of a bunch of files and format the data for import into excel. Awk seems like a powerful tool, but it seems oriented to... (1 Reply)
Discussion started by: yogert909
1 Replies

5. UNIX for Advanced & Expert Users

Finding volumes with mirrored DRL(Dirty Region Log)

hi, How do I find VxVM volumes which have a mirrored DRL. thanks in advance Prasi (2 Replies)
Discussion started by: prasi_in
2 Replies

6. AIX

Can't mount showing 0506-342 The superblock on /dev/fslv00 is dirty

Dear All Last day in Aix 5.2 server by executing # df –g I found following: Filesystem GB blocks Free %Used Iused %Iused Mounted on . . /dev/fslv00 58.00 136.70 -135% 212103 1% /sprod After shutting down by following command # shutdown –h And when... (1 Reply)
Discussion started by: xa52000
1 Replies

7. Shell Programming and Scripting

Quick-and-dirty g++ compilation

I am creating a small bash file that will take one argument and compile it: #!/bin/bash OUT=${$1%.cpp} # C++ source files always end in .cpp g++ -Wall $1 -o $OUT chmod 777 $OUT The error message says 'bad substitution', namely where OUT is defined. How to fix this? (1 Reply)
Discussion started by: figaro
1 Replies
Login or Register to Ask a Question