Kernel flaw makes Linux crash easily
Linux developers and vendors have released patches to correct the flaw
TechWorld.com - A flaw in the Linux kernel allows a 20-line C program to crash most distributions using the 2.4 and 2.6 kernels running on x86 and x86-64 architectures, according to security researchers.
The problem means that anyone with an ordinary user account on a Linux machine can crash the entire server, according to Oyvind Saether, who discovered the bug along with Stian Skjelstad. Administrator access isn't required.
"Using this exploit to crash Linux systems requires the (ab)user to have shell access or other means of uploading and running the program (like cgi-bin and FTP access)," Saether wrote in an advisory on Friday. "This exploit has been reportedly used to take down several lame free-shell providers' servers."
Linux developers released a kernel patch to coincide with the advisory, available on Kernel.org. Major Linux vendors have also begun releasing their own versions of the fix, including Red Hat Inc.'s Fedora Project and Gentoo Linux.
The most recent updates to the Linux kernel, to be available in Version 2.6.7, fix the problem, according to Linus Torvalds. The new version is expected to be available today.
The bug is in the way the kernel handles floating point exceptions, developers said. While it is serious, two factors limit the danger: It can be exploited only by someone with a valid user account, and it doesn't allow the attacker to gain control of the system.
As Linux continues to grow in popularity and gain market share, security researchers and potential attackers are increasing their scrutiny of the operating system's underlying code, and as a result, more problems are inevitably coming to light, say industry observers.
Microsoft Corp. has attempted to exploit this trend by presenting open-source vendors' security efforts in an unfavorable light. This effort has been assisted by research such as Forrester Research Inc.'s controversial "days of risk" study, which concluded that Linux vendors had on average taken longer than Microsoft to release patches -- a conclusion hotly disputed by Linux companies.
Recently, Linux vendors were forced to distribute patches for a critical flaw in CVS, a widely used program for collaborating on software development, that could have allowed a malicious user to gain unauthorized access to development code. The flaw, found by E-Matters GmbH, allows a user to exploit a "heap overflow" that could make it possible to execute arbitrary code on the CVS server, according to Stefan Esser, chief security and technology officer at E-Matters.
Following the discovery of this bug, researchers decided to have a closer look at the CVS source code and discovered at least six more flaws, including one thatcould allow an attacker to take control of CVS from the Internet. The new flaws were announced publicly last Wednesday, and several distributors have since released fixes.
- Building a New Era in Enterprise IT As the digital revolution spawned by the explosive growth of disruptive technologies such as mobile, cloud, social, and analytic tools continues to fundamentally...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- AIIM Trendscape: The New Mobile Reality This AIIM Trendscape report shares data, expert opinions, and a unique perspective on the impact of cloud and mobility in the enterprise, surfacing...
- Empowering Your Mobile Workers A modern mobile IT strategy is no longer an option, it is an absolute necessity. Here's how some of the nation's most progressive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Linux and Unix White Papers | Webcasts