Dirty COW Vulnerability
what is dirty cow vulnerability?
Dirty COW was a
vulnerability in the Linux kernel. It allowed processes to write read-only
files. This exploit made use of a race condition that lived inside the kernel
functions which handle the copy-on-write (COW) feature of memory mappings.
CVE number of
dirty cow- CVE-2016-5195
·
About CVE-2016-5195
– A race condition was found in the way the Linux kernel’s memory subsystem handles
the copy-on-write breakage of private read-only memory mappings.
·
An attacker
would first require access to a shell on the device before they could use this
exploit.
What does
this vulnerability do?
This vulnerability allows
the user to bypass the normal file system protections and write to files that
are owned by the system.
Consequences
·
Opens up
many avenues for attack,
·
which
results in the unprivileged user becoming rooted in the system and,
·
able to access any system resources.
How was it fixed?
Dirty Cow was one of
the first security issues transparently fixed in Ubuntu by the Canonical Live
Patch Service.
Follow Us Here - Twitter
Comments
Post a Comment