{"id":909,"date":"2017-01-04T12:56:29","date_gmt":"2017-01-04T12:56:29","guid":{"rendered":"http:\/\/www.haxed.me.uk\/?p=909"},"modified":"2017-01-04T12:57:15","modified_gmt":"2017-01-04T12:57:15","slug":"dirty-cow-cve-mitigating-rackspace","status":"publish","type":"post","link":"https:\/\/haxed.me.uk\/index.php\/2017\/01\/04\/dirty-cow-cve-mitigating-rackspace\/","title":{"rendered":"Mitigating the Dirty Cow vulnerability in CentOS, RedHat, Ubuntu, Debian and Opensuse"},"content":{"rendered":"<p>How to fix Dirty Cow vulnerability in CentOS, RedHat, Ubuntu, Debian, CloudLinux and OpenSuse Linux servers<\/p>\n<p>Dirty COW vulnerability was first discovered a decade ago and has been present in Linux kernel versions from 2.6.22, which was released in 2007.<\/p>\n<p>But the vulnerability gained attention only recently when hackers started exploiting it. This has led to the release of this bug as CVE-2016-5195 on October 19th, 2016.<br \/>\nWhat is Dirty Cow vulnerability (CVE-2016-5195)?<\/p>\n<p>CVE-2016-5195 aka \u201cDirty COW vulnerability\u201d involves a privilege escalation exploit which affects the way memory operations are handled.<\/p>\n<p>Since the feature that is affected by this bug is the copy-on-write (COW) mechanism in Linux kernel for managing \u2018dirty\u2019 memory pages, this vulnerability is termed \u2018Dirty COW\u2019.<\/p>\n<p>Misusing this flaw in kernel, an unprivileged local user can escalate his privileges in the system and thus gain write access on read-only memory updates.<\/p>\n<p>Using this privilege escalation, local users can write to any file that they can read. Any malicious application or user can thus tamper with critical read-only root-owned files.<br \/>\nIs Dirty Cow vulnerability (CVE-2016-5195) critical?<\/p>\n<p>Dirty COW vulnerability affects the Linux kernel. Most open-source operating systems such as RedHat, Ubuntu, Fedora, Debian, etc. are based over Linux kernel.<\/p>\n<p>As a result, this vulnerability is a \u2018High\u2019 priority one as it can affect a huge percentage of servers running over Linux and Android kernels.<\/p>\n<p>CVE-2016-5195 exploit can be misused by malicious users who are provided with shell access in Linux servers. They can gain root access and attack other users.<\/p>\n<p>When combined with other attacks such as SQL injection, this privilege escalation attack can even mess up the entire data in these servers, which makes it a critical one.<br \/>\nAre you servers affected by Dirty Cow exploit?<\/p>\n<p>If your server or VM or container is hosted with any of these OS versions, then they are vulnerable:<\/p>\n<p>    Red Hat Enterprise Linux 7.x, 6.x and 5.x<\/p>\n<p>    CentOS Linux 7.x, 6.x and 5.x<\/p>\n<p>    Debian Linux wheezy, jessie, stretch and sid<\/p>\n<p>    Ubuntu Linux precise (LTS 12.04), trusty, xenial (LTS 16.04), yakkety and vivid\/ubuntu-core<\/p>\n<p>    SUSE Linux Enterprise 11 and 12<\/p>\n<p>For more information about mitigating yourself against Dirty cow, please see:<\/p>\n<p>https:\/\/bobcares.com\/blog\/dirty-cow-vulnerability\/<\/p>\n<p>Credit to Reeshma Mathews from bobcares.com for this <\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to fix Dirty Cow vulnerability in CentOS, RedHat, Ubuntu, Debian, CloudLinux and OpenSuse Linux servers Dirty COW vulnerability was first discovered a decade ago and has been present in Linux kernel versions from 2.6.22, which was released in 2007. &hellip; <a href=\"https:\/\/haxed.me.uk\/index.php\/2017\/01\/04\/dirty-cow-cve-mitigating-rackspace\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85,3],"tags":[],"class_list":["post-909","post","type-post","status-publish","format-standard","hentry","category-exploits","category-security"],"_links":{"self":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/comments?post=909"}],"version-history":[{"count":2,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/909\/revisions"}],"predecessor-version":[{"id":911,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/909\/revisions\/911"}],"wp:attachment":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/media?parent=909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/categories?post=909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/tags?post=909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}