Dirty Cow: Privilege Escalation Exploit, Linux Kernel

Okay so likely have heard about this, if you like me use Linux daily, in your college, professional or hobbyist life but like what the heck is it really?

To paraphrase from the initial disclosure docs:

the privilege-escalation vulnerability potentially allows any installed application, or malicious code smuggled onto a box, to gain root-level access and completely hijack the device.

The programming bug gets its name from the copy-on-write mechanism in the Linux kernel; the implementation is so broken, programs can set up a race condition to tamper with what should be a read-only root-owned executable mapped into memory

So exactly what does all that mean?  It means your web facing servers and even Androids have a big time issue with multi tasking in a sense.  This bug allows for what is called a ‘race condition’  which as you may have guessed makes for a first one in wins scenario.  The bad part is that that allows the kernel to be tricked into mapping a new ‘page’  (a coding term for the memory allocation) without fully un-allocating or ‘unlocking’  the previous one. This in turn allows for a bad memory page to get into a root-owned (the almighty full system admin) which is bad news.  The process that is overwritten or bypassed is called Copy-On-Write  (hence the COW part of the name) and being that the race condition is executed by using and triggering dirty paging within or  in an effort to gain privileged access its been Dubbed Dirty CoW.  If you feel so inclined to read the much more technical details feel free to read up on CVE 2016-5195

New Malware for Windows targets firefox users.

Below is an image of the new malware attempting to get  Windows users of Firefox to install a drive-by malware labeled by  Windows Defender as  Trojan:Kovtar.

 

Valid versions of  Firefox for windows are:

Stable: 47.0.1 available  @ https://firefox.com

Beta: 48.0.b5  available @ https://www.mozilla.org/en-US/firefox/channel/

Nightly: 50.0.a1 available @ https://nightly.mozilla.org/

For any questions about using any or the validity of your version free free to visit:

SUMO (SUpport MOzilla)

Mozilla IRC network   in channels #firefox or #sumo

DC area Developer? Emerging Tech your thing?

Well then Let’s see you come out to  DevIgnition 2016  over at the AoL Campus in Dulles,Va on Apr 29th.

Not sure if you are up for the topics? Have a look at Last year’s Elephant Talks

DevIgnition 2016 – Apr 29 2016 $30

Git clients & servers need checked. Pre-2.7 bugs.

Courtesy of Laël Cellier we are now aware of  several rather nasty  bugs in  git versions 1.7 -1.9, even tho they were patched in 2.7  (released back in Feb, rather quietly  I may add).  The bugs stem mostly form  signed vs. unsigned  integers in a strcopy function path_name()….  okay so now in layman’s terms what the heck does all that mean?

Essentially  when you have a really long  filename or  repo using files with long names using a older version of  git,  there runs a verifiable risk that you run into what is know as a heap_overwrite   aka  100%+ of  container.

 

Source:  git-server-client bugs

WordPress: Got Plugins? (4 Plugins you need to check)

Thanks to a wordfence blog post, we have a fuller understanding of a previously  disclosed backdoored official plugin ( CCTM ) and  3 more  plugins which within the last  week or so have been publicly  disclosed and patched.  For full details read teh wordfence blog post  below:

1 Backdoored Plugin, 3 Other Publicly Vulnerable ones