This Linux grinch could put a hole in your security stocking

A potential flaw in how Linux handles access rights could give attackers entry, a security firm charges

A grinch may be snatching away some year-end holiday time, forcing Linux system administrators to fill a gaping security hole in their systems.

Named after the proverbially grumpy Dr. Seuss character, the grinch vulnerability could affect all Linux systems, potentially providing attackers with unfettered root access, according to security service provider Alert Logic, which introduced grinch to the world Tuesday via a blog post.

Grinch could be as severe as the Shellshock Linux shell flaw that roiled the Internet in September, the company warned.

The fundamental flaw resides in the Linux authorization system, which can inadvertently allow privilege escalation, granting a user "root," or full administrative access.

With full root access, an attacker would be able to completely control a system, including the ability to install programs, read data and use the machine as a launching point for compromising other systems.

To date, Alert Logic has not seen any exploits that harness this vulnerability, nor did the research team find any existing mention of this hole in the vulnerability database maintained by the Community Emergency Response Team (CERT), according to Stephen Coty, Alert Logic's director of threat research.

The vulnerability could span the range of all Linux systems, including versions of Linux running on cloud services such as Amazon's and Microsoft's. Approximately 65 percent of all web servers on the Internet utilize a Unix/Linux based operating system, a W3Techs survey estimated. It could also affect Android phones, which run the Linux kernel.

To control administrative access, Linux keeps a list of all the registered users on a machine, in a group typically known as "wheel," who can be granted full root access (usually through the Unix sudo command).

A knowing attacker could get full root access by modifying the wheel group, either directly or by manipulating an adjoining program such as the Polkit graphical interface for setting user permissions, Alert Logic said.

The company has notified Red Hat, which maintains Polkit, about the problem, and Red Hat has opened a trouble ticket on the issue. Nonetheless, Coty believes that the problem is fundamentally one with the Linux kernel architecture, so the Linux kernel development team would have to provide the ultimate correction.

Although no patches currently exist for the vulnerability, Alert Logic stated, an organization can take preventive measures to guard against grinch-based attacks. Logging software could be deployed in order to monitor user actions, and flag any unusual behavior. They can also rewrite administrative rules to minimize sudo operations.

Joab Jackson covers enterprise software and general technology breaking news for The IDG News Service. Follow Joab on Twitter at @Joab_Jackson. Joab's e-mail address is Joab_Jackson@idg.com

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags Alert LogicsecurityExploits / vulnerabilities

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Joab Jackson

IDG News Service
Show Comments

Essentials

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?