Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 09-20-2010, 08:46 AM   #1
gumdrop
Confirmed User
 
gumdrop's Avatar
 
Join Date: Feb 2005
Posts: 482
Linux Users - Kernel Exploit released~~!

Quote:
which unfortunately is just about everyone running 64-bit Linux. To make matters worse, in the last day we?ve received many reports of people attacking production systems using an exploit for this vulnerability, so if you run Linux systems, we recommend that you strongly consider patching this vulnerability. (Linux vendors release important security updates every month, but this vulnerability is particularly high profile and people are using it aggressively to exploit systems).
PLEASE STICKY THIS!

http://blog.ksplice.com/2010/09/cve-2010-3081/
__________________
I am NOT Godaddy! Most excellent Domains & Cheap Hosting

“Buy an iPad, kill a Chinaman” - Brendan O’Neill
gumdrop is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 09:07 AM   #2
Brujah
Beer Money Baron
 
Brujah's Avatar
 
Industry Role:
Join Date: Jan 2001
Location: brujah / gmail
Posts: 22,157
It's a very sloppy update too, one of my servers anyway.... /tmp is noexec, and it failed to exec the configs for it as a result.
__________________
Brujah is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 09:11 AM   #3
gumdrop
Confirmed User
 
gumdrop's Avatar
 
Join Date: Feb 2005
Posts: 482
:mad

Quote:
Originally Posted by Brujah View Post
It's a very sloppy update too, one of my servers anyway.... /tmp is noexec, and it failed to exec the configs for it as a result.
There is no update for CenOS yet as of today.
__________________
I am NOT Godaddy! Most excellent Domains & Cheap Hosting

“Buy an iPad, kill a Chinaman” - Brendan O’Neill

Last edited by gumdrop; 09-20-2010 at 09:14 AM..
gumdrop is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 09:19 AM   #4
Zyber
Confirmed User
 
Industry Role:
Join Date: Aug 2001
Posts: 832
thanks for sharing this
Zyber is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 09:23 AM   #5
Barry-xlovecam
It's 42
 
Industry Role:
Join Date: Jun 2010
Location: Global
Posts: 18,083
It doesn't even say what kernels are vulnerable ...

Quote:
$.uname -a

I updated the kernel some days ago.
Barry-xlovecam is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 11:49 AM   #6
gumdrop
Confirmed User
 
gumdrop's Avatar
 
Join Date: Feb 2005
Posts: 482
ALL 64-Bit kernels.
__________________
I am NOT Godaddy! Most excellent Domains & Cheap Hosting

“Buy an iPad, kill a Chinaman” - Brendan O’Neill
gumdrop is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 12:42 PM   #7
borked
Totally Borked
 
borked's Avatar
 
Industry Role:
Join Date: Feb 2005
Posts: 6,284
why "ALL" 64-bit kernels... it states:

Quote:
The flaw identified by CVE-2010-3081 (Red Hat Bugzilla bug 634457) describes an issue in the 32/64-bit compatibility layer implementation in the Linux kernel, versions 2.6.26-rc1 to 2.6.36-rc4.
2.6.18 looks good to me...
__________________

For coding work - hit me up on andy // borkedcoder // com
(consider figuring out the email as test #1)



All models are wrong, but some are useful. George E.P. Box. p202
borked is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 12:44 PM   #8
ladida
Confirmed User
 
ladida's Avatar
 
Join Date: Nov 2005
Posts: 2,167
Rofl. Do you realize how many of these are found each and every day? And how many stay hidden for years? Lol@sticky this
__________________
agentGFY *at* gmail.com
ladida is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 12:50 PM   #9
gumdrop
Confirmed User
 
gumdrop's Avatar
 
Join Date: Feb 2005
Posts: 482
Quote:
Originally Posted by borked View Post
why "ALL" 64-bit kernels... it states:



2.6.18 looks good to me...
NO!

Quote:
The published workarounds that we?ve seen, including the workaround recommended by Red Hat, can themselves be worked around by an attacker to still exploit the system.
You can use the test tool:
https://www.ksplice.com/uptrack/cve-2010-3081
__________________
I am NOT Godaddy! Most excellent Domains & Cheap Hosting

“Buy an iPad, kill a Chinaman” - Brendan O’Neill
gumdrop is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 12:53 PM   #10
gumdrop
Confirmed User
 
gumdrop's Avatar
 
Join Date: Feb 2005
Posts: 482
Quote:
Originally Posted by ladida View Post
Rofl. Do you realize how many of these are found each and every day? And how many stay hidden for years? Lol@sticky this
Terrible!
LOL@youbeenhackedby this.
__________________
I am NOT Godaddy! Most excellent Domains & Cheap Hosting

“Buy an iPad, kill a Chinaman” - Brendan O’Neill

Last edited by gumdrop; 09-20-2010 at 12:59 PM..
gumdrop is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 01:11 PM   #11
roly
Confirmed User
 
Join Date: Aug 2002
Posts: 1,844
i use yum to update my kernel but there's no updates showing on any of the repositories that i use yet.
roly is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 01:27 PM   #12
borked
Totally Borked
 
borked's Avatar
 
Industry Role:
Join Date: Feb 2005
Posts: 6,284
Quote:
Originally Posted by gumdrop View Post
NO!



You can use the test tool:
https://www.ksplice.com/uptrack/cve-2010-3081
I don't understand why you say NO!? The exploit says the .26-.34 kernels are affected, and the test from ksplice is simply a tool to see if the system has been exploited....

Although this doesn't suggest your system hasn't been compromised already, if exploited, a reboot will close the holes. Kind of like closing the stable door after the horse went for a piss, but still.

to me looks like .18 kernels are fine?
__________________

For coding work - hit me up on andy // borkedcoder // com
(consider figuring out the email as test #1)



All models are wrong, but some are useful. George E.P. Box. p202
borked is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 01:29 PM   #13
borked
Totally Borked
 
borked's Avatar
 
Industry Role:
Join Date: Feb 2005
Posts: 6,284
Quote:
Originally Posted by roly View Post
i use yum to update my kernel but there's no updates showing on any of the repositories that i use yet.
It's takes ages for anything to reach yum if it's a simple patch.

Someone released a patch for my kernel -
https://bugzilla.redhat.com/show_bug.cgi?id=634457#c20

when it gets approved, I'll load it on, whether the .18 kernel is vulnerable or not
__________________

For coding work - hit me up on andy // borkedcoder // com
(consider figuring out the email as test #1)



All models are wrong, but some are useful. George E.P. Box. p202
borked is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 03:16 PM   #14
gumdrop
Confirmed User
 
gumdrop's Avatar
 
Join Date: Feb 2005
Posts: 482
If you are using CentOS there has been some progress:

http://bugs.centos.org/view.php?id=4518
__________________
I am NOT Godaddy! Most excellent Domains & Cheap Hosting

“Buy an iPad, kill a Chinaman” - Brendan O’Neill
gumdrop is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 03:19 PM   #15
gumdrop
Confirmed User
 
gumdrop's Avatar
 
Join Date: Feb 2005
Posts: 482
Quote:
Originally Posted by borked View Post
I don't understand why you say NO!? The exploit says the .26-.34 kernels are affected, and the test from ksplice is simply a tool to see if the system has been exploited....

Although this doesn't suggest your system hasn't been compromised already, if exploited, a reboot will close the holes. Kind of like closing the stable door after the horse went for a piss, but still.

to me looks like .18 kernels are fine?
According to the CentOS team it's not:
Quote:
1) public exploit (with backdoor) for gaining root on a CentOS-5 x86_64 machine
2) only x86_64 machine are affected from kernel-2.6.18-164 and onward (CentOS-5.4 too)
http://bugs.centos.org/view.php?id=4518
__________________
I am NOT Godaddy! Most excellent Domains & Cheap Hosting

“Buy an iPad, kill a Chinaman” - Brendan O’Neill
gumdrop is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 04:28 PM   #16
zagi
Confirmed User
 
Join Date: Jan 2004
Posts: 1,238
Doesn't look like it affects CentOS that much:


$ ./diagnose-2010-3081
Diagnostic tool for public CVE-2010-3081 exploit -- Ksplice, Inc.
(see http://www.ksplice.com/uptrack/cve-2010-3081)

$$$ Kernel release: 2.6.18-194.11.1.el5xen
$$$ Backdoor in LSM (1/3): not available.
$$$ Backdoor in timer_list_fops (2/3): not available.
$$$ Backdoor in IDT (3/3): checking...not present.

Your system is free from the backdoors that would be left in memory
by the published exploit for CVE-2010-3081.


$ cat /etc/redhat-release
CentOS release 5.5 (Final)
__________________
Managed US/NL Hosting [ [Reality Check Network ]
Dell XEON Servers + 1/2/3 TB Packages ICQ: 4-930-562
zagi is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 05:05 PM   #17
Klen
 
Klen's Avatar
 
Industry Role:
Join Date: Aug 2006
Location: Little Vienna
Posts: 32,235
Well this exploit can be resolved simply by adding ip restriction to ssh.
Klen is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 05:57 PM   #18
signupdamnit
Confirmed User
 
signupdamnit's Avatar
 
Industry Role:
Join Date: Aug 2007
Posts: 6,697
https://access.redhat.com/kb/docs/DOC-40265

Note that they need to gain access to a local account before it is of any use to an attacker.

Also:

Quote:

As suggested on the Full Disclosure mailing list, it is possible to temporarily mitigate this issue. However, the steps provided below are only meant for the publicly-circulated exploit - they are insufficient for completely mitigating this vulnerability. As such, we strongly encourage you to install the updated kernel packages for Red Hat Enterprise Linux 5 when they become available soon.

Last edited by signupdamnit; 09-20-2010 at 05:59 PM..
signupdamnit is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-20-2010, 09:25 PM   #19
mrsmut
Confirmed User
 
Join Date: Apr 2003
Posts: 121
I've seen today a server with Centos being hacked this way through an old install of oscommerce

as usual, the atacker uploaded a phpshell and downloaded the exploit to gain root, after that defaced all sites on server

Server was running Centos 5 64bit with kernel 2.6.18-194.8.1
attacker overwrote every index* file, when atacker was discovered, tried to rm -rf * whole drive, luckily we caught it on time.

Centos 5 IS vulnerable now
mrsmut is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-21-2010, 11:57 PM   #20
borked
Totally Borked
 
borked's Avatar
 
Industry Role:
Join Date: Feb 2005
Posts: 6,284
Quote:
Originally Posted by roly View Post
i use yum to update my kernel but there's no updates showing on any of the repositories that i use yet.
it's now in the repository...

Code:
 kernel	x86_64	2.6.18-194.11.4.el5	updates	19 M
 kernel-devel	x86_64	2.6.18-194.11.4.el5	updates	5.4 M
2.6.18-194.11.4 closes this flaw
http://lwn.net/Articles/406414/
__________________

For coding work - hit me up on andy // borkedcoder // com
(consider figuring out the email as test #1)



All models are wrong, but some are useful. George E.P. Box. p202
borked is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2010, 01:09 AM   #21
roly
Confirmed User
 
Join Date: Aug 2002
Posts: 1,844
Quote:
Originally Posted by borked View Post
it's now in the repository...

Code:
 kernel	x86_64	2.6.18-194.11.4.el5	updates	19 M
 kernel-devel	x86_64	2.6.18-194.11.4.el5	updates	5.4 M
2.6.18-194.11.4 closes this flaw
http://lwn.net/Articles/406414/
yes all updated thanks
roly is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2010, 02:15 AM   #22
borked
Totally Borked
 
borked's Avatar
 
Industry Role:
Join Date: Feb 2005
Posts: 6,284
Don't forget to reboot after kernel update....
__________________

For coding work - hit me up on andy // borkedcoder // com
(consider figuring out the email as test #1)



All models are wrong, but some are useful. George E.P. Box. p202
borked is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2010, 06:22 AM   #23
roly
Confirmed User
 
Join Date: Aug 2002
Posts: 1,844
Quote:
Originally Posted by borked View Post
Don't forget to reboot after kernel update....
that's what i don't understand when people show uptime on their servers of 1 year or something, i seem to be updating my kernel every 4-6 weeks or so.
roly is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.