Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


New glibc vulnerability
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

New glibc vulnerability

AbdussamadAbdussamad Member
edited February 2016 in General

Google and Redhat researchers have discovered a new vulnerability in glibc that allows remote code execution:

https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

«1

Comments

  • It is the second or third vulnerability in less than a year.

  • NetworkPandaNetworkPanda Member
    edited February 2016

    The POC is not working on cPanel servers, just returns normal DNS responses without segmentation faults. It seems that the patch is already applied on them with the daily automatic updates.

  • thanks for the heads up.

    updated my CentOS and Debian VPSes.

  • I read about it already at BBC news. updated all servers :)

  • KuJoeKuJoe Member, Host Rep
    edited February 2016

    For anybody interested, these are the patched versions of glibc on Debian and CentOS (along with how to check):

    rpm -qa | grep glibc

    CentOS 6 = glibc-2.12-1.166.el6_7.7

    CentOS 7 = glibc-2.17-106.el7_2.4

    dpkg -s libc-bin | grep Version

    Debian 6 = 2.11.3-4+deb6u11

    Debian 7 = 2.13-38+deb7u10

    Debian 8 = 2.19-18+deb8u3

    Debian Sid = 2.21-8

    Thanked by 3Ole_Juul Tom Dylan
  • Thanks @KuJoe
    I got what I needed already, but it took me half an hour to find the name of the Debian7 file to confirm that I was OK after update. Funny how nobody except you seemed to realize that this would be useful. :)

    Thanked by 1KuJoe
  • KuJoeKuJoe Member, Host Rep

    @Ole_Juul said:
    Thanks KuJoe
    I got what I needed already, but it took me half an hour to find the name of the Debian7 file to confirm that I was OK after update. Funny how nobody except you seemed to realize that this would be useful. :)

    Yeah, it took some digging for me also which is why I posted it here to save somebody some time. The CentOS versions were posted on their forum after somebody asked them (and after they were told to sign up for their newsletter for the answer).

  • Im not techie just running apt-get update && apt-get -y upgrade

  • Arch Linux Security Advisory ASA-201602-14

    Severity: Critical
    Date : 2016-02-17
    CVE-ID : CVE-2015-7547 CVE-2015-8776 CVE-2015-8777 CVE-2015-8778
    CVE-2015-8779
    Package : glibc
    Type : multiple issues
    Remote : Yes
    Link : https://wiki.archlinux.org/index.php/CVE

    Summary

    The package glibc before version 2.22-4 is vulnerable to multiple issues
    including but not limited to arbitrary code execution, information
    disclosure and denial of service.
    It is advised to restart all services that may perform DNS lookups.

    Resolution

    Upgrade to 2.22-4.

    pacman -Syu "glibc>=2.22-4"

    The problems have been fixed upstream but no release is available yet.

    Workaround

    None.

    Description

    • CVE-2015-7547 (arbitrary code execution)

    A stack-based buffer overflow was found in the way the libresolv library
    performed dual A/AAAA DNS queries. A remote attacker could create a
    specially crafted DNS response which could cause libresolv to crash or,
    potentially, execute code with the permissions of the user running the
    library. Note: this issue is only exposed when libresolv is called from
    the nss_dns NSS service module.

    • CVE-2015-8776 (information disclosure)

    It was found that out-of-range time values passed to the strftime
    function may cause it to crash, leading to a denial of service, or
    potentially disclosure information.

    • CVE-2015-8777 (restriction bypass)

    LD_POINTER_GUARD was an environment variable which controls
    security-related behavior, but was not ignored for privileged binaries
    (in AT_SECURE mode). This might allow local attackers (who can supply
    the environment variable) to bypass intended security restrictions.

    • CVE-2015-8778 (arbitrary code execution)

    An integer overflow in hcreate and hcreate_r which can result in
    an out-of-bound memory access. This could lead to application crashes
    or, potentially, arbitrary code execution.

    • CVE-2015-8779 (arbitrary code execution)

    A stack overflow (unbounded alloca) in the catopen function can cause
    applications which pass long strings to the catopen function to crash
    or, potentially execute arbitrary code.

    Impact

    A remote attacker is able to execute arbitrary code, potentially
    disclosure sensitive information or perform a denial of service attack
    via multiple vectors.

    References

    https://access.redhat.com/security/cve/CVE-2015-7547
    https://access.redhat.com/security/cve/CVE-2015-8776
    https://access.redhat.com/security/cve/CVE-2015-8777
    https://access.redhat.com/security/cve/CVE-2015-8778
    https://access.redhat.com/security/cve/CVE-2015-8779
    http://seclists.org/oss-sec/2016/q1/153

    Thanked by 1howardsl2
  • There is probably so many Odays for GNU/Linux... Dunno if it's really safer than M$ Windows...

  • @info_hash said:
    There is probably so many Odays for GNU/Linux... Dunno if it's really safer than M$ Windows...

    That myth has gone down in flames in the recent years ;)

  • info_hash said: There is probably so many Odays for GNU/Linux... Dunno if it's really safer than M$ Windows...

    https://www.cvedetails.com/top-50-vendors.php?year=2015

    https://www.cvedetails.com/top-50-vendors.php?year=2016

  • Silvenga said: Did not expect that. So Microsoft was more secure that Apple last year...

    The number of vulnerabilities does not indicate any particular level of security.

  • rokok said: Im not techie just running apt-get update && apt-get -y upgrade

    So how do you know for sure you got the patch you need?

  • deadbeef said:

    That myth has gone down in flames in the recent years ;)

    Yep!

    https://www.cvedetails.com/top-50-vendors.php?year=2016

    Right, but that means only known / patched vulnerabilities, isn't it?...

  • Um don't you have to reboot for the patch to be effective? Don't think just an update & upgrade solves this.

    Correct me if I am wrong.

  • NetworkPandaNetworkPanda Member
    edited February 2016

    @Nihim said:
    Um don't you have to reboot for the patch to be effective? Don't think just an update & upgrade solves this.

    Correct me if I am wrong.

    You can use lsof to find all services and applications using libc and then restart these services/apps only. No reboot required.

  • k0nslk0nsl Member
    edited February 2016

    "Because this vulnerability affects a large amount of applications on the system, the safest and recommended way to assure every application uses the updated glibc packages is to restart the system."

    Source: https://access.redhat.com/articles/1332213

    [edit: fck'd up the formatting.]

    @Nihim said:
    Um don't you have to reboot for the patch to be effective? Don't think just an update & upgrade solves this.

    Correct me if I am wrong.

  • That is true but is it "safe" enough? I went with the reboot approach.

  • @KuJoe said:
    For anybody interested, these are the patched versions of glibc on Debian and CentOS

    And for Ubuntu:

    Ubuntu 15.10:
    libc6 2.21-0ubuntu4.1

    Ubuntu 14.04 LTS:
    libc6 2.19-0ubuntu6.7

    Ubuntu 12.04 LTS:
    libc6 2.15-0ubuntu10.13

    Thanked by 1KuJoe
  • In case somebody doesn't know how to check which one is installed, before or after, use this:
    ldd --version

  • @Silvenga said:
    Did not expect that. So Microsoft was more secure that Apple last year...

    Number of vulnerabilities found doesn't define one product is worse or better.

    The fact that apple had the most means that in effect they are patching more security issues and are patching exploits that have been found.

    Which I see personally as a good thing.

    Thanked by 1mehargags
  • @Mun said:
    Which I see personally as a good thing.

    If we assume that both companies are taking the same efforts to discover issues (although I bet MS, being the company for servers, is taking more actions) then the number of discovered exploits is a very good metric of how a base system was designed. Although, it gets complicated when we have so many variables. I wouldn't consider it to be bad, but defiantly not a good thing in any right.

    I think mobile posting got worst somehow...

  • BradNDBradND Member
    edited February 2016

    I've seen some pretty genius(crazy?) Suggestions to mitigate this temporarily, my favorite being limiting DNS inbound/outbound to 512bytes... sigh

  • @silvenga

    I don't think you are correct on that statement at all. Their are numerous issues with IE alone that date back to its initial release that were only found in 2014. To make an argument one is doing better because one does servers is absolutely idiotic.

    https://forums.fogproject.org/topic/2702/attention-avoid-internet-explorer-major-exploit-found

    To make it simpler, your assumption is absolute shit. Both companies are not taking the same effort to discover issues. Clearly Microsoft is doing diddly if they had an exploit floating around in IE for 12+ years.

  • Mun said: To make it simpler, your assumption is absolute shit. Both companies are not taking the same effort to discover issues. Clearly Microsoft is doing diddly if they had an exploit floating around in IE for 12+ years.

    MS has been trying to end IE support for years. If anything, the reason why they had so many issue was because they were trying to maintain backwards support of systems created at the birth of the Internet. Very recently, MS is dropping support and starting over and the effects are impressive.

    I didn't say MS is more secure because of servers, I said more people are checking because there's more risk. Simplistically, more eyes but less discoveries is a good thing. Less eyes more discoveries is a bad thing. I would say there's more security analysts checking Windows than Mac for exploits right now.

  • @silvenga

    I would still say you are wrong.

    Edge is nothing more then rebranded IE.

    https://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-32367/year-2015/Microsoft-Edge.html

    Both systems are closed source and so people can't look at the code.

    I think more over many of the patches at apple are for iPhones and iOS systems.

    Apple iPhones have a huge market when you really consider it, and apple has been making them extremely secure. Even requiring the FBI to request apple to physically alter the device to access the device. That shows that Apple is by far more secure then you think.

  • Mun said: that Apple is by far more secure then you think.

    https://www.apple.com/customer-letter/

  • Mun said: Apple iPhones have a huge market when you really consider it

    So is the current iOS using the affected glibc?

Sign In or Register to comment.