It’s probably a trade-off with the exploitation of a new Linux vulnerability

(Adobe)

It’s possible that some Linux distributions simply have exposed user passwords and supported clipboards in attacks that exploit an escape-serial neutralization vulnerability that affects the util-linux package’s “wall” command, tracked as CVE-2024-28085, The Hacker News reports.

The potential intrusions, which could be just Debian Bookworm and Ubuntu 22. 04, involve tricking users into activating a fake sudo and offering their credentials, according to security researcher Skyler Ferrante. However, exploiting the security issue, also known as WallEscape, will only succeed. If the MESG app is enabled and the Wall command requests setgid permissions.

“In Ubuntu 22. 04, we have enough to reveal a user’s password by default. The only indication of an attack against the user will be an incorrect password activation when you type your password correctly, as well as your password in your command history. ” Ferrante said.

An immediate upgrade to util-linux 2. 40 is recommended.

Simon HenderyApril 4, 2024

With its devices under attack by cyberespionage gangs, Ivanti’s CEO has promised a “new era” in which security will be paramount.

SecurityWeek reports that the number of Chinese-made devices on U. S. networks is growing in the U. S. The U. S. stock increased 40% year-over-year to just about 300,000 in February, representing 4% of all devices located in the U. S. Despite efforts by the federal government to limit use. use of Chinese products in the country, adding a recent executive order highlighting the protective hazards for cranes, cars, and electric garage batteries made in China.

A “cascade of security breaches” last year allowed the most sensible Chinese cyberespionage operatives to borrow high-level emails from the U. S. government.

By clicking the Subscribe button below, you agree to SC Media’s Terms and Conditions and Privacy Policy.

Leave a Comment

Your email address will not be published. Required fields are marked *