Sunday, 4 December 2016

The Dirty COW Linux Exploit Patched Successfully

It has been some time since the nightmarish Poxy and Poodle vulnerabilities scared Internet users out of their wits, and now the web faces a new security exploit – a Linux kernel flaw bearing the ‘user-friendly’ name “Dirty COW”.
Dirty COW represents a privilege-escalation vulnerability that hackers can exploit and do harm to web servers using any Internet-connected device.
We’ve managed to address the issue on time and apply the necessary patches to our Linux-based system.

What is the Dirty COW security bug about?

In fact, the Dirty COW vulnerability is not new, at least not to Linux’s founder Linus Torvalds who admits to having uncovered it 11 years ago.
A bug fix patch was released in due time, but 3 years later it was undone by another security fix, leaving the Linux kernel vulnerable to network attacks for a period of 9 years. It was not until a couple of days ago that the ‘dirty’ Linux kernel threat re-surfaced online again.
According to Red Hat, the Dirty COW security flaw has left the Linux kernel vulnerable to unprivileged users who want to gain root access in order to increase their privileges and compromise the given server’s security.
This allows local users to gain write access to read-only memory mappings and hijack an Internet-connected device within practically a few seconds.
It is namely the broken copy-on-write (COW) mechanism in the Linux kernel that the flaw has been named after.

Evostrix Web Hosting

Evostrix Web Hosting Blog News

No comments:

Post a Comment