![]() |
Linux Users - Kernel Exploit released~~!
Quote:
http://blog.ksplice.com/2010/09/cve-2010-3081/ |
It's a very sloppy update too, one of my servers anyway.... /tmp is noexec, and it failed to exec the configs for it as a result.
|
Quote:
|
thanks for sharing this
|
It doesn't even say what kernels are vulnerable ... |
ALL 64-Bit kernels.
|
why "ALL" 64-bit kernels... it states:
Quote:
|
Rofl. Do you realize how many of these are found each and every day? And how many stay hidden for years? Lol@sticky this :)
|
Quote:
Quote:
https://www.ksplice.com/uptrack/cve-2010-3081 |
Quote:
LOL@youbeenhackedby this. |
i use yum to update my kernel but there's no updates showing on any of the repositories that i use yet.
|
Quote:
Although this doesn't suggest your system hasn't been compromised already, if exploited, a reboot will close the holes. Kind of like closing the stable door after the horse went for a piss, but still. to me looks like .18 kernels are fine? |
Quote:
Someone released a patch for my kernel - https://bugzilla.redhat.com/show_bug.cgi?id=634457#c20 when it gets approved, I'll load it on, whether the .18 kernel is vulnerable or not |
|
Quote:
Quote:
|
Doesn't look like it affects CentOS that much:
$ ./diagnose-2010-3081 Diagnostic tool for public CVE-2010-3081 exploit -- Ksplice, Inc. (see http://www.ksplice.com/uptrack/cve-2010-3081) $$$ Kernel release: 2.6.18-194.11.1.el5xen $$$ Backdoor in LSM (1/3): not available. $$$ Backdoor in timer_list_fops (2/3): not available. $$$ Backdoor in IDT (3/3): checking...not present. Your system is free from the backdoors that would be left in memory by the published exploit for CVE-2010-3081. $ cat /etc/redhat-release CentOS release 5.5 (Final) |
Well this exploit can be resolved simply by adding ip restriction to ssh.
|
https://access.redhat.com/kb/docs/DOC-40265
Note that they need to gain access to a local account before it is of any use to an attacker. Also: Quote:
|
I've seen today a server with Centos being hacked this way through an old install of oscommerce
as usual, the atacker uploaded a phpshell and downloaded the exploit to gain root, after that defaced all sites on server Server was running Centos 5 64bit with kernel 2.6.18-194.8.1 attacker overwrote every index* file, when atacker was discovered, tried to rm -rf * whole drive, luckily we caught it on time. Centos 5 IS vulnerable now |
Quote:
Code:
kernel x86_64 2.6.18-194.11.4.el5 updates 19 M http://lwn.net/Articles/406414/ |
Quote:
|
Don't forget to reboot after kernel update....
|
Quote:
|
All times are GMT -7. The time now is 04:52 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123