Deutsch English Français Italiano |
<vd6oln$nlc8$3@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!news.roellig-ltd.de!news.mb-net.net!open-news-network.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: -hh <recscuba_google@huntzinger.com> Newsgroups: comp.os.linux.advocacy Subject: Re: 9.9/10 security vulnerability affecting Linux (and others) set to be revealed on October 6th Date: Fri, 27 Sep 2024 13:05:59 -0400 Organization: A noiseless patient Spider Lines: 235 Message-ID: <vd6oln$nlc8$3@dont-email.me> References: <2O1JO.214184$FzW1.145017@fx14.iad> <vd2mdm$1ue8$1@dont-email.me> <alcJO.194436$kxD8.182014@fx11.iad> <vd5bkk$jdi1$1@dont-email.me> <cJxJO.172505$1m96.122070@fx15.iad> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Fri, 27 Sep 2024 19:05:59 +0200 (CEST) Injection-Info: dont-email.me; posting-host="847d01ba9e0c452dfcb9045efda32f65"; logging-data="775560"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+PyZxhZvnAilttlc8tc7luiGJ5KqZDw5A=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:X/NFpAgiTIDIHMWEKaWkmDFdx84= Content-Language: en-US In-Reply-To: <cJxJO.172505$1m96.122070@fx15.iad> Bytes: 11375 On 9/27/24 8:40 AM, CrudeSausage wrote: > On 2024-09-27 12:17 a.m., RonB wrote: >> On 2024-09-26, CrudeSausage <crude@sausa.ge> wrote: >>> On 2024-09-26 12:03 a.m., RonB wrote: >>>> On 2024-09-26, CrudeSausage <crude@sausa.ge> wrote: >>>>> Worse than Heartbleed, Meltdown or Spectre. According to a GitHub >>>>> developer: >>>>> >>>>> "From a generic security point of view, a whole Linux system as it is >>>>> nowadays is just an endless and hopeless mess of security holes >>>>> waiting >>>>> to be exploited." (kind of like Chris Ahlstrom's body) >>>>> >>>>> <https://cybersecuritynews.com/critical-unauthenticated-rce-flaw/> >>>> >>>> Yet another "catastrophic" Linux security threat that will be fixed >>>> within >>>> days. >>> >>> They're working on it and so far coming up with no way of fixing it. I >>> wouldn't be surprised if there is no solution by October 6th. If that is >>> the case, you just know that bad actors will be attacking Linux >>> relentlessly from October 7th on. This looks like the real deal. 9.9/10 >>> is pretty serious when you consider that the aforementioned issues were >>> rated between 5 and 7 on 10. >>> >>>> You realize that Cyber Security News makes their case for existence by >>>> hyperventilating about potential "catastrophic" security threats, >>>> right? >>> >>> Perhaps, but the developers on GitHub have been freaking out as well to >>> a point that Lunduke felt it necessary to bring this problem to light. >>> Those developers are usually arrogant about their ability to fix such >>> issues, not this time. >> >> Interestingly enough, since this works through the CUPS system On >> Unix-based >> machines, this also affects MacOS. Odd Cyber Security News didn't mention >> that little factlet. >> >> Summary >> >> The first of a series of blog posts has been published detailing a >> vulnerability in the Common Unix Printing System (CUPS), which >> purportedly allows attackers to gain remote access to UNIX-based >> systems. >> The vulnerability, which affects various UNIX-based operating >> systems, >> can be exploited by sending a specially crafted HTTP request to >> the CUPS >> service. >> Threat Topography >> >> Threat Type: Remote code execution vulnerability in CUPS service >> Industries Impacted: UNIX-based systems across various industries, >> including but not limited to, finance, healthcare, and government >> Geolocation: Global, with potential impact on UNIX-based systems >> worldwide >> Environment Impact: High severity, allowing attackers to gain >> remote >> access and execute arbitrary code on vulnerable systems >> >> Overview >> >> X-Force Incident Command is monitoring what claims to be the first >> in a >> series of blog posts from security researcher, Simone Margaritelli, >> detailing a vulnerability in the Common Unix Printing System (CUPS), >> which purportedly can be exploited by sending a specially crafted >> HTTP >> request to the CUPS service. The vulnerability affects various >> UNIX-based >> operating systems, including but not limited to, Linux and macOS. The >> vulnerability can be exploited to gain remote access to affected >> systems, >> allowing attackers to execute arbitrary code and potentially gain >> elevated privileges. X-Force is investigating the disclosure and >> monitoring for exploitation. We will continue to monitor this >> situation >> and provide updates as available. >> >> Key Findings >> >> The vulnerability affects various UNIX-based operating systems, >> including but not limited to, Linux and macOS >> All versions of Red Hat Enterprise Linux (RHEL) are affected, >> but are >> not vulnerable in their default configurations. >> The vulnerability can be exploited by sending a specially >> crafted HTTP >> request to the CUPS service >> The vulnerability allows attackers to gain remote access to >> affected >> systems and execute arbitrary code >> The vulnerability has been identified as high severity, with >> potential >> for significant impact on affected organizations >> >> Mitigations/Recommendations >> >> Disable the CUPS service or restrict access to the CUPS web >> interface >> In case your system can’t be updated and you rely on this service, >> block all traffic to UDP port 631 and possibly all DNS-SD traffic >> (does not apply to zeroconf) >> Implement additional security measures, such as network >> segmentation >> and access controls, to limit the spread of the vulnerability >> Conduct thorough vulnerability assessments and penetration >> testing to >> identify and remediate any other potential vulnerabilities >> Implement robust incident response and disaster recovery plans to >> mitigate the impact of a potential breach >> >> https://securityintelligence.com/news/fysa-critical-rce-flaw-in-gnu- >> linux-systems/ >> >> And this... >> >> That doomsday critical Linux bug: It's CUPS. May lead to remote >> hijacking >> of devices >> >> No patches yet, can be mitigated, requires user interaction >> Thu 26 Sep 2024 // 17:34 UTC >> Final update After days of anticipation, what was billed as one or >> more >> critical unauthenticated remote-code execution vulnerabilities in all >> Linux systems was today finally revealed. >> >> In short, if you're running the Unix printing system CUPS, with >> cups-browsed present and enabled, you may be vulnerable to attacks >> that >> could lead to your computer being commandeered over the network or >> internet. The attacks require the victim to start a print job. Do >> not be >> afraid. >> >> The bugs were found and privately reported by software developer >> Simone >> Margaritelli who has now openly disclosed the security weaknesses in >> detail here. This write-up is said to be part one of two or maybe >> three, >> so expect more info at some point. >> >> He went public today at 2000 UTC after seemingly becoming >> frustrated with >> the handling of his vulnerability reports by CUPS developers. No >> patches >> are available yet. Public disclosure was previously expected to be no >> later than September 30. >> >> What you need to know for now, according to Margaritelli, is: >> Disable and/or remove the cups-browsed service. >> >> Update your CUPS installation to bring in security updates if or >> when >> available. >> >> Block access to UDP port 631 and consider blocking off DNS-SD, too. >> >> It affects "most" Linux distros, "some" BSDs, possibly Google >> ChromeOS, >> Oracle's Solaris, and potentially others, as CUPS is bundled with >> various distributions to provide printing functionality. >> >> To exploit this across the internet or LAN, a miscreant needs to >> reach >> your CUPS service on UDP port 631. Hopefully none of you have that >> facing the public internet. The miscreant also has to wait for >> you to >> start a print job. >> >> If port 631 isn't directly reachable, an attacker may be able to >> spoof >> zeroconf, mDNS, or DNS-SD advertisements to achieve exploitation. ========== REMAINDER OF ARTICLE TRUNCATED ==========