New Linux Security Flaw Could Give Hackers Full System Access

March 9, 2019

Written by wukovits

new linux security flaw could give hackers full system accessLinux users, beware of the security flaw known as “Dirty Sock” and identified as CVE-2019-7304.

This critical security flaw was discovered by security researcher Chris Moberly, who disclosed the details to the makers of the Ubuntu distribution last month. The flaw resides in the REST API for the Snapd service.

That is a universal Linux packaging system responsible for making applications compatible with Linux across multiple distributions, and with no modifications to the executable necessary.  Unfortunately, that means that Ubuntu isn’t the only build impacted by the flaw.  Literally every flavor of Linux is at risk.

Moberly had this to say about the issue:

“Snapd versions 2.28 through 2.37 incorrectly validated and parsed the remote socket address when performing access controls on its UNIX socket.  A local attacker could use this to access privileged socket APIs and obtain administrator privileges.”

If there’s a silver lining to be found in Moberly’s discovery, it is the fact that the nature of the issue prevents a hacker from exploiting it remotely.  They’d have to have physical access to the machine or somehow trick the user into doing something that would trigger a program to escalate privileges on behalf of the hackers.  Even so, the fact that the exploit can be used to gain total access and control to a target system means it’s not something that can be ignored.

The good news is that Canonical, the makers of Ubuntu, have moved quickly and have already issued an update that addresses this flaw, with other major Linux distributions having followed suit.  Regardless of what build you’re using, a fix is likely already available. So if it’s been a while since you updated, now would be an excellent time to do so.  Better to be safe than sorry.

Used with permission from Article Aggregator

Bayou Tech

We provide solutions for your business. Find out how we can help.

Related Articles

Key Considerations for Effective Cybersecurity Implementation

Consider this: In the realm of cybersecurity, things often get tangled in the web of "you should do it anyway" arguments. Yet, for busy business owners bombarded with daily "must-dos," deciphering the essentials from the fluff can feel like a cyber maze. We aim to...

Unlocking Small Business Success: The Impact of AI in a Digital Era

In the rapidly evolving business landscape, staying competitive necessitates embracing technological advancements. Artificial Intelligence (AI), once perceived as a luxury for larger enterprises, is now accessible to small businesses, offering new opportunities for...