Possible Linux Severe CVSS 9.9/10 Unauthenticated RCE Flaw
from hal_5700X@sh.itjust.works to technology@lemmy.world on 26 Sep 2024 11:49
https://sh.itjust.works/post/25770162

Simone Margitelli’s post on the find

Margitelli posted a screenshot that implies he submit this bug to Canonical and Red Hat, who rated the vulnerability to have a CVSS of 9.9. If this is true, this bug would be more critical than the infamous Heartbleed, Spectre, and Meltdown exploits. Information is really limited right now about this bug, and also somewhat contradictory. I cannot find a public statement from Red Hat or Canonical confirming the existance of this bug, but have yet to deny it. This is typical for an exploit of this magnitude. However, according to Security Online, both insitutions have confirmed its severity.

Full disclaimer, this thing could be totally overhyped/overblown right now. Its going to take a few weeks before all the information comes out. It wouldn’t be the first time a vulnerability has been overhyped to pressure the dev into fixing it. In the mean time, Linux users should make sure to keep their systems up to date.

#technology

threaded - newest

mp3@lemmy.ca on 26 Sep 2024 12:57 next collapse

Suspicious how the Twitter and Instagram accounts went private since.

thesmokingman@programming.dev on 26 Sep 2024 13:17 next collapse

The Security Online article only cites Margitelli’s post on the matter. My assumption has been the article used the post as its single source. On one hand, watching MS fuck shit up for years, I want to believe Margitelli. On the other hand, researchers using weird tools and uninterested in reality are why curl is now a CNA.

I’m personally frustrated with Margitelli’s post because it’s all about abandoning responsible disclosure globally rather than naming and shaming (Canonical? Red Hat? Both? Others? If it affects all GNU/Linux I’d expect every single distro maintainer to be named and shamed). Responsible disclosure is our best solution to make sure innocent bystanders don’t get caught in the crossfire. When specific entities don’t abide by responsible disclosure we lambast those specific entities not the entire process built to keep users safe.

Alphane_Moon@lemmy.world on 26 Sep 2024 16:44 next collapse

I have zero knowledge about the details and processes involved in security issue disclosure and even I get the feeling something is off about Margitelli’s post.

He can let his findings speak for themselves when they are responsibly disclosed (and then start the sensationalism).

MigratingtoLemmy@lemmy.world on 26 Sep 2024 17:09 collapse

It’ll be out in a couple of weeks and then we’ll know exactly which prick has mommy issues over their code

qqq@lemmy.world on 26 Sep 2024 23:27 collapse

This is a real exploit chain in cups-browsed. The tl;dr is that it will add basically anything that knows the correct protocol to your list of available printers, and this can be exploited for RCE if you print to the malicious printer. The service listens on all interfaces by default on UDP 631.

It is not as horrible as it was marketed, but it’s real and not great. You may or may not have this service running by default; I didn’t on Fedora.

His full write-up is here: evilsocket.net/…/Attacking-UNIX-systems-via-CUPS-…

style99@lemm.ee on 27 Sep 2024 03:52 next collapse

Well, then…

sudo systemctl stop cups-browsed
sudo systemctl disable cups-browsed
InvertedParallax@lemm.ee on 27 Sep 2024 11:43 collapse

Cups was due, too much functionality on too many systems, it needed to be more limited and secure by default.