Well, this is embarrassing for Linux...

Discuss everything about Linux here!

Moderator: Community Moderator

Post Reply
User avatar
OnTheLimit
R.I.P
R.I.P
Posts: 50330
Joined: 30 Nov 2011, 18:08
Status: Court Jester and Agent Provocateur
Has thanked: 55 times
Been thanked: 78 times

Well, this is embarrassing for Linux...

Post by OnTheLimit »

A rather embarrassing bug has been discovered which allows anyone to break into a Linux machine with ease. :doh:

If you press the backspace key 28 times on a locked-down Linux machine you want to access, a Grub2 bootloader flaw will allow you to break through password protection and wreck havoc in the system.

Researchers Hector Marco and Ismael Ripoll from the Cybersecurity Group at Universitat Politècnica de València recently discovered the vulnerability within GRUB, the bootloader used by most Linux distros.

As reported by PC World, the bootloader is used to initialize a Linux system at start and uses a password management system to protect boot entries -- which not only prevents tampering but also can be used to disable peripheries such as CD-ROMs and USB ports.

Without GRUB password protection, an attacker could also boot a system from a live USB key, switching the operating system in order to access files stored on the machine's hard drives.

The researchers discovered the flaw within GRUB2, of which versions 1.98 to 2.02 are affected. These versions were released between 2009 and today, which makes the vulnerability a long-standing and serious problem.

In a security advisory, Marco and Ripoli said the bootloader is used by most Linux distributions, resulting in an "incalculable number of affected devices."

Exploiting the flaw -- and checking if you are vulnerable -- is simple. When the bootloader asks for a username, simply press the backspace button 28 times. If vulnerable, the machine will reboot or you will encounter a Grub rescue shell.

The shell grants a user a full set of admin privileges -- within the rescue function only -- to load customised kernels and operating systems, install rootkits, download the full disc or destroy all data on a machine.

The researchers say the fault lies within two functions; the grub_password_get() function and the andgrub_password_get() script which suffer integer overflow problems. Exploiting the flaw causes out of bounds overwrite memory errors. When a user presses backspace, the bootloader is erasing characters which do not exist -- damaging its memory enough to trigger an exception in authentication protocols.

Not only does the vulnerability give attackers the chance to steal data and tamper with peripherals and passwords, but Linux entries can be modified to deploy malware.

While there is an emergency patch available on Github for Linux users, the main vendors have been made aware of this security flaw. It is recommended that users update their machines as soon as patches have been deployed, but it is worth noting an attacker needs physical access to the machine to exploit the flaw.
Image
Clicking the "Thanks" button is a great motivator and a much appreciated courtesy!
All member donations, no matter how small, go directly towards keeping the servers up and the lights on!
User avatar
LghPuppy
GFX Team
GFX Team
Posts: 40382
Joined: 06 Jun 2011, 21:25
Location: Watering the trees
Has thanked: 127 times
Been thanked: 81 times

Re: Well, this is embarrassing for Linux...

Post by LghPuppy »

I only know 2 people here that know anything about Linux, so I'll pass this info on to them.
Image
Please consider Donating
“The only thing necessary for the triumph of evil is for good men to do nothing.”
Edmund Burke
Post Reply

Return to “Everything Linux”