Canonical Snapd Vulnerability Gives Root Access in Linux
#1
Quote:A researcher has discovered a new vulnerability called "Dirty_Sock" in the REST API for Canonical's snapd daemon that can allow attackers to gain root access on Linux machines. To illustrate how these vulnerabilities can be exploited, the researcher has released to PoCs that use different methods to elevate privileges.

This vulnerability has since been patched by Canonical, the maker of Ubuntu and the Snap framework, but unless admins install the snapd update, local users will be able to gain root level access to servers running the daemon.

Security researcher Chris Moberly, who discovered this bug, told BleepingComputer in an interview that while he tested it only on Ubuntu, other Linux servers would most likely be affected.

"This bug would affect any Linux using snapd. Exploitation might vary, though. For example, dirty_sockv1 uses the create-user API. That API actually uses a back-end Linux command "adduser" which is not included in all distros of Linux (some just have useradd, for example). This is one of the reasons I worked really hard to get dirty_sockv2 working - that version lets me include any bash script I want so can be very portable."

SOURCE: https://www.bleepingcomputer.com/news/se...-in-linux/
[-] The following 2 users say Thank You to silversurfer for this post:
  • darktwilight, harlan4096
Reply


Forum Jump:


Users browsing this thread:
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Recover Corrupted EDB to PST
Safely recover your ...Jyoti_baghel — 05:25
GFYI [Official] AirVPN 2025 Christmas / ...
  We at Geeks For Y...jasonX — 20:47
GFYI [Official] Macrium Reflect X Home E...
  We at Geeks For ...jasonX — 20:39
GFYI [Official] Hasleo Backup Suite Vers...
  We at Geeks For ...jasonX — 20:32
GFYI [Official] XYplorer Pro 2025 Christ...
      We at Geeks F...jasonX — 20:23

[-]
Birthdays
Today's Birthdays
avatar (41)Enlargedterrestrial20
Upcoming Birthdays
avatar (43)ivyhuv

[-]
Online Staff
There are no staff members currently online.

>