-
Tips for becoming a good boxer - November 6, 2020
-
7 expert tips for making your hens night a memorable one - November 6, 2020
-
5 reasons to host your Christmas party on a cruise boat - November 6, 2020
-
What to do when you’re charged with a crime - November 6, 2020
-
Should you get one or multiple dogs? Here’s all you need to know - November 3, 2020
-
A Guide: How to Build Your Very Own Magic Mirror - February 14, 2019
-
Our Top Inspirational Baseball Stars - November 24, 2018
-
Five Tech Tools That Will Help You Turn Your Blog into a Business - November 24, 2018
-
How to Indulge on Vacation without Expanding Your Waist - November 9, 2018
-
5 Strategies for Businesses to Appeal to Today’s Increasingly Mobile-Crazed Customers - November 9, 2018
Simple Vulnerability Puts Millions Of Linux Users At Risk
A group of Spanish researchers has uncovered a long-standing vulnerability in Linux that pressing the backspace key 28 times will bypass the login screen on some Linux distros.
Advertisement
Two researchers from the Cybersecurity Group at Spain’s Polytechnic University of Valencia published a paper that reveals just how easy it is to gain access to many Linux systems. After hitting the backspace key 28 times, the Linux system would return a critical error which initiates the GRUB rescue shell. Ubuntu, Red Hat, and Debian have all issued patches to fix it as well.
As an open source operating system, Linux is considered much more secure than other OS’s like Windows or Mac OS.
As reported by PC World, the bootloader is used to initialize a Linux system at start and uses a password management system to protect boot entries – which not only prevents tampering but also can be used to disable peripheries such as CD-ROMs and USB ports.
Vulnerable versions of the Grub2 loader date back as far as 2009 until present. They have assured the users that this activity would have to be done on individual machines and cannot launch an infection over the internet in general.
To check the status of your system, simply press the Backspace key 28 times when Grub asks your user name.
Hackers who successfully exploit this can get access to a Grub rescue shell, a very powerful shell which can give them “full access to the grub’s console”. Researchers have described a scenario in which an advanced persistent threat (APT) actor or malicious insiders exploit the vulnerability to plant a piece of malware that can be used to spy on the victim or steal sensitive information even if it is in encrypted format. Attackers can overwrite the disk, causing denial of service. Using this shell’s commands, an attacker can rewrite the Grub2 code loaded in RAM to completely bypass the authentication check.
While there is an emergency patch available on Github for Linux users, the main vendors have been made aware of this security flaw.
Advertisement
When a computer is turned on, the bootloader loads first and then the operating system.