viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
Ubuntu fixes bugs that standard users could use to become root
Technology

Ubuntu fixes bugs that standard users could use to become root

11/11/2020

Image of ones and zeros with the word

Ubuntu developers have fixed a series of vulnerabilities that made it easy for standard users to gain coveted root privileges.

“This blog post is about an astonishingly straightforward way to escalate privileges on Ubuntu,” Kevin Backhouse, a researcher at GitHub, wrote in a post published on Tuesday. “With a few simple commands in the terminal, and a few mouse clicks, a standard user can create an administrator account for themselves.”

The first series of commands triggered a denial-of-service bug in a daemon called accountsservice, which as its name suggests is used to manage user accounts on the computer. To do this, Backhouse created a Symlink that linked a file named .pam_environment to /dev/zero, changed the regional language setting, and sent accountsservice a SIGSTOP. With the help of a few extra commands, Backhouse was able to set a timer that gave him just enough time to log out of the account before accountsservice crashed.

When done correctly, Ubuntu would restart and open a window that allowed the user to create a new account that—you guessed it—had root privileges. Here’s a video of Backhouse’s attack in action.

Ubuntu 20.04 local privilege escalation using vulnerabilities in gdm3 and accountsservice

Backhouse said that Ubuntu uses a modified version of accountsservice that contains code that’s not included in the upstream version. The extra code looks for the .pam_environment file in the home directory. By making the file a symlink to /dev/zero, .pam_environment gets stuck in an infinite loop.

The second bug involved in the hack resided in the GNOME display manager, which among other things manages user sessions and the login screen. The display manager, which is often abbreviated as gdm3, also triggers the initial setup of the OS when it detects no users currently exist.

Advertisement

“How does gdm3 check how many users there are on the system?” Backhouse asked rhetorically. “You probably already guessed it: by asking accounts-daemon! So what happens if accounts-daemon is unresponsive? The relevant code is here.”

The vulnerabilities could be triggered only when someone had physical access to, and a valid account on, a vulnerable machine. It worked only on desktop versions of Ubuntu. Maintainers of the open source OS patched the bugs last week. Backhouse, who said he found the vulnerabilities by accident, has many more technical details in the above-linked blog post.

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

OneWeb readies internet satellites for launch
OneWeb, the heavily funded startup that’s setting out to create …

OneWeb readies internet satellites for launch

Six Russians accused of the world’s most destructive hacks indicted
Six men accused of carrying out some of the world’s …

Six Russians accused of the world’s most destructive hacks indicted

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • Payment card-skimming malware targeting 4 sites found on Heroku cloud platform
    Skimming heist that hit convenience chain may …
    29/01/2020
  • Android sends 20x more data to Google than iOS sends to Apple, study says
    Android sends 20x more data to Google …
    30/03/2021
  • Fast & Furious: Crossroads lives video games a quarter-mile at a time
    Lucid Lane has developed a service to …
    08/05/2020
  • ProtonMail takes aim at Google with an encrypted calendar
    ProtonMail takes aim at Google with an …
    31/12/2019
  • How Wargaming overcame mistakes and reclaimed the future of World of Tanks
    How Wargaming overcame mistakes and reclaimed the …
    16/08/2020

Popular Posts

  • 100 million more IoT devices are exposed—and they won’t be the last
    100 million more IoT devices are exposed—and …
    14/04/2021 0
  • Mimecast says SolarWinds hackers breached its network and spied on customers
    Mimecast says SolarWinds hackers breached its network …
    16/03/2021 0
  • Touch of gray: The Air Force can’t retire the Boeing 707
    Touch of gray: The Air Force can’t …
    17/03/2021 0
  • Top 10 Places Creepier Than Stephen King’s …
    17/03/2021 0
  • Top 10 Things You Should Know About …
    17/03/2021 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2021 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh