RSS Feed
News
Oct
27
Dirty Cow Exploit (CVE-2016-5195)
Posted by Jeff H. on 27 October 2016 10:51 AM

Dirty Cow (CVE-2016-5195)

If you use rackAID's management services or managed hosting, relax.  We fixed this already.   

Exploit Details

Dirty Cow is a kernel level exploit that can allow a local user possible gain access to the memory mappings of another program.  With this access, the could potentially escalate their access.    Security researchers have found this exploit in the wild via HTTP packet captures.

This is an exploit in the Linux kernel software.   This is the core of the server's OS.   Typically, you have to install a patch and reboot the server.

The Fix 

Fortunately, we use KSplice to manage all of our servers.   This allows slipstream the patch without a reboot.   In fact, the Ksplice guys (part of Oracle) pushed out the fix shortly after it was released.

 

For more info, I recommend you check out the web site setup by the researchers: 

https://dirtycow.ninja/

 

Note that any device, phone or computer running Linux is likely impacted.   Be sure to watch out for updates to your phones, internet devices and any system that runs Linux. 


Comments (0)
Post a new comment
 
 
Full Name:
Email:
Comments:
CAPTCHA Verification 
 
Please enter the text you see in the image into the textbox below (we use this to prevent automated submissions).