Privacy News Exploit Code Bypasses Linux Security Features Leaving Systems Vulnerable

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
Linux is generally referred to as a more secure operating system and it happens for a good reason: the number of hacks, malware, and vulnerabilities that can be used to compromise a Linux machine is substantially smaller than in the case of Windows, and it’s all thanks to security features that are baked into the OS.

But security researcher Chris Evans says that it’s easier than most of us think to break into a Linux system and all you need is a scriptless exploit.

How it works
First of all, some context. Evans says that his exploit attempts to use a memory corruption vulnerability in the GStreamer framework that’s available in the majority of Linux distributions - his demonstration, however, was made on Fedora.

The exploit bypasses two of the security systems that are integrated into Linux, namely address space layout randomization (ASLR) and data execution protection (DEP), which is also known as NX or No-Execute.

Specifically, ASLR’s main purpose is to randomize where code loads into memory, which makes it possible for any active exploit to be less successful and to reduce its impact on the system. At the same time, DEP adds a new protection layer by simply blocking the exploit from loading into memory.

So what the researcher tried to do was to actually bypass these security systems using code that can eventually disable both of them and allow further action on a target machine.

“In order to attack the FLIC decoder, there simply isn’t any scripting opportunity. The attacker gets, once, to submit a bunch of scriptless bytes into the decoder, and try and gain code execution without further interaction... and good luck with that! Welcome to the world of scriptless exploitation in an ASLR environment,” the security researcher explains.

Evan points out that the same vulnerability also exists in Ubuntu 16.04 and in any other distribution with gstreamer installed, but he notes that getting the exploit to work on anything else than Fedora involves quite a lot of work, including optimizing a larger number of heap and code offsets.

“This was a fairly ridiculous exploit. But it was worth doing because it’s proof that scriptless exploits are possible, even within the context of decent 64-bit ASLR. It was possible to commandeer memory reads, writes and even additions within the decoder loop to slowly but surely advance the exploit and gain control,” he explains.

The vulnerability will most likely be patched as soon as possible, but for the moment, it’s important to note that the exploit works exclusively on Fedora.
 

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Awesome, glad this is out in the open now.
What I love about Linux is, once discovered it usually does not
take long to start working on a solution for vulnerabilities in Linux.
They are good at patching and fixing the OS and don't drag their feet ;)
 

ZeroDay

Level 30
Verified
Top Poster
Well-known
Aug 17, 2013
1,905
Linux vulnerabilities, once discovered are patched quickly whether it be by the kernel devs or distro devs, or even users submitting patches. That's one of the great things about open source.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top