Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Alert Logic dismiss criticism of "grinch" Linux flaw

by The Gurus
December 22, 2014
in Editor's News
Share on FacebookShare on Twitter

Alert Logic has dismissed criticism of its research into the Linux bug it named grinch.
 
Last week, Alert Logic said that grinch exists in the new authorisation system that allows privilege escalation through Wheel, bypassing it by using the existing polkit authentication.
 
“Wheel users have access to all system commands including the ability to install any package or code,” Stephen Coty, chief security evangelist at Alert Logic said. “We can abuse the user’s group privileges to give us access, thus granting direct authentication bypass, even if the wheel user cannot get root like in Ubuntu ecosystems.”
 
However, a blog by Trend Micro dismissed the sale of the flaw as more a “common overly permissive configuration of many Linux systems”. It said: “The scope of this vulnerability is very limited. Grinch is not remotely exploitable; it requires that an attacker have physical access the server they want to attack. In addition, the attacker must already have access to an account in the wheels group (i.e., already have elevated privileges as local administrators), polkit must be installed, and the PackageKit package management system must be in use.
 
“The barriers to exploitation are significant; in a very real way to exploit this flaw you must already have very high levels of access, making exploiting this ‘vulnerability’ unnecessary.”
 
Also critical were Red Hat, who said that the research “incorrectly classifies expected behaviour as a security issue”.
 
It said: “The PackageKit console client is a utility which allows users in the Wheel group, also known as local administrators, to install packages. This utility allows local administrators to install packages without a password if they are a ‘local user’, meaning they are using the physical keyboard attached to the computer. If you are a user who does not have a physical console (such as a remote users connected via SSH), you must supply authentication credentials to install packages.
 
“Red Hat does not consider this to be a security issue or even a bug. This is the expected behaviour of the PackageKit console client.”
 
In an email to IT Security Guru, Coty admitted that the attack vector only works in certain Linux implementations, and affects more the non-tech savvy users that would implement Linux as an alternative to windows due to the efficiencies that Linux provides.
 
Asked if the “dismissal” was justified, he said: “Just because the architecture was built to perform this function, does not necessarily mean that it is secure or cannot lead to comprise. Intended behaviour does not always mean the feature cannot be abused or modified in the future to eliminate potential misuse.
 
“The way that Polkit is designed can lead to unexpected results or compromise. The issue is that there is a way to open up the surface area to attacks. If installing packages worked like every other operation, such as removing packages or adding repositories, and always asked for a password, then this wouldn’t have the abuse potential we’ve identified.”
 
Coty also said that Trend Micro’s claims that an attacker has to have physical access to the server that they want to attack was incorrect, as it it requires access to the command line on the box to perform these functions which c
an be achieved through a number of ways. “A User is compromised via client-side exploit such as browser, flash, mail client, etc,” he said.
 
Penetration tester and security researcher Robin Wood, said that he was not completely familiar with the flaw, but it did seem like expected behaviour rather than a bug, but it was also expected as far as the developers are concerned.
 
“I can see some abuses for it, but it is nothing worth losing sleep over at the moment,” he said. “Maybe in the future [it may be a concern] if someone can think of a good way to leverage it on mass scale.”
 

FacebookTweetLinkedIn
Tags: FlawLinuxVulnerability
ShareTweet
Previous Post

Sony Pictures attack sees USA and North Korean Governments involved

Next Post

15 predictions for 2015

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information