Deutsch English Français Italiano |
<uuc04d$1s3mb$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!npeer.as286.net!npeer-ng0.as286.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Nuno Silva <nunojsilva@invalid.invalid> Newsgroups: comp.os.linux.misc Subject: Re: Malware find in the news: xz related. Date: Sun, 31 Mar 2024 16:45:08 +0100 Organization: A noiseless patient Spider Lines: 44 Message-ID: <uuc04d$1s3mb$1@dont-email.me> References: <uu7r9s$kh5b$2@dont-email.me> <uua83j$19ff9$1@dont-email.me> <6608ab05@news.ausics.net> <6608acc9@news.ausics.net> <27bd4b53-920c-f119-6d15-7e844d4a39ea@example.net> <uubq8s$1qpft$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain Injection-Date: Sun, 31 Mar 2024 15:39:57 +0200 (CEST) Injection-Info: dont-email.me; posting-host="1bdb957d15eb057ff0f1f94b28f1d63f"; logging-data="1969867"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+dbwJbGsLAmp1pgphlsybM" User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.5 (gnu/linux) Cancel-Lock: sha1:YCfQnTj5GEldRIIr/A4XP0YeoDA= Bytes: 2693 On 2024-03-31, Lew Pitcher wrote: > On Sun, 31 Mar 2024 11:29:08 +0200, D wrote: > >> On Sun, 31 Mar 2024, Computer Nerd Kev wrote: >> >>> Computer Nerd Kev <not@telling.you.invalid> wrote: >>>> MarioCCCP <NoliMihiFrangereMentulam@libero.it> wrote: >>>>> >>>>> any hints to patch the vulnerability, or will it be >>>>> addressed soon and be released as security updates ? >>>> >>>> The code was targeting Debian, and only reached the Testing version >>>> of Debian >>> >>> And RHEL, and of course all the distros based on those (or at least >>> those using Systemd). >>> >>> >> >> How is this exploited? Does it require login/pw? > > An "infected" system just needs an SSH server exposed to the internet > to be exploited. The "bad actor" uses a pre-built key to initiate > contact and contact doesn't go any further than key validation. > > However, the key validation of a bad-actor key causes SSHd to extract > a payload from the key, and pass that payload to a system(3) call. > > So, while the "bad actor" initiator never officially "logs on" to > the system (no userid, etc), they are afforded sshd privilege-level > access to the system to run commands. > > HTH If I understand correctly (please correct me if I'm wrong!), it's a certificate, not a key. While this may sound like nitpicking, in this case it seems to matter a lot, because for *certificates*, the hijacked function is invoked even if certificate authentication is not enabled. https://bugzilla.mindrot.org/show_bug.cgi?id=3675 -- Nuno Silva