Exploit Logs You Into Linux Systems After Hitting Backspace

Page 1 of 1 [ 10 posts ] 

Edenthiel
Veteran
Veteran

User avatar

Joined: 12 Sep 2014
Age: 57
Gender: Female
Posts: 2,820
Location: S.F Bay Area

19 Dec 2015, 11:29 pm

http://www.pcmag.com/article2/0,2817,2496870,00.asp


"To quickly check if your system is vulnerable, when the Grub ask you the username, press the Backspace 28 times. If your machine reboots or you get a rescue shell then your Grub is affected,"


_________________
“For small creatures such as we the vastness is bearable only through love.”
―Carl Sagan


Fogman
Veteran
Veteran

User avatar

Joined: 19 Jun 2005
Age: 58
Gender: Male
Posts: 3,986
Location: Frå Nord Dakota til Vermont

20 Dec 2015, 6:48 am

Thank for the info on that, I'm updating my system as I post this.


_________________
When There's No There to get to, I'm so There!


EnglishInvader
Veteran
Veteran

User avatar

Joined: 14 Sep 2009
Age: 43
Gender: Male
Posts: 1,012
Location: Hertfordshire, UK

20 Dec 2015, 11:06 am

The article says that the exploit requires physical access to the computer to be used so it doesn't really pose much of a threat.



Spiderpig
Veteran
Veteran

User avatar

Joined: 14 Apr 2013
Gender: Male
Posts: 7,893

20 Dec 2015, 12:38 pm

When does Grub ask for a username?


_________________
The red lake has been forgotten. A dust devil stuns you long enough to shroud forever those last shards of wisdom. The breeze rocking this forlorn wasteland whispers in your ears, “Não resta mais que uma sombra”.


Freedoomed
Veteran
Veteran

User avatar

Joined: 17 Oct 2015
Age: 29
Gender: Male
Posts: 960

20 Dec 2015, 1:37 pm

Spiderpig wrote:
When does Grub ask for a username?

https://help.ubuntu.com/community/Grub2/Passwords



Spiderpig
Veteran
Veteran

User avatar

Joined: 14 Apr 2013
Gender: Male
Posts: 7,893

20 Dec 2015, 1:44 pm

Oh, well, I don't use password protection in Grub. Still, I find it a bit hard to swallow that the bug can log you into the operating system, as opposed to just the bootloader.


_________________
The red lake has been forgotten. A dust devil stuns you long enough to shroud forever those last shards of wisdom. The breeze rocking this forlorn wasteland whispers in your ears, “Não resta mais que uma sombra”.


Edenthiel
Veteran
Veteran

User avatar

Joined: 12 Sep 2014
Age: 57
Gender: Female
Posts: 2,820
Location: S.F Bay Area

20 Dec 2015, 2:24 pm

EnglishInvader wrote:
The article says that the exploit requires physical access to the computer to be used so it doesn't really pose much of a threat.

For non-emulated servers or home systems, I agree. Laptops, on the other hand...

Also, this:
Quote:
we successfully exploited this vulnerability in a Debian 7.5 under Qemu getting a Grub rescue shell.
(emphasis mine)

...which means physical access may not actually necessary. Maybe.

Also, this *only* applies to the Grub2 password protection on the spec'd versions (roughly since 2009) of Grub.

(more technical info here: http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html )


_________________
“For small creatures such as we the vastness is bearable only through love.”
―Carl Sagan


Nine7752
Toucan
Toucan

User avatar

Joined: 3 Dec 2015
Age: 62
Posts: 269
Location: North of Nowhere

25 Dec 2015, 3:20 pm

This story got way too much attention. It's just the password for the boot loader, something a lot of people don't even do. The 28-backspace grub bug doesn't give a hacker anything more than a simple USB boot image would.

Once they get onto your hard drives, all they would see is the likely-encrypted disk image(s) on LUKS or such. There's no practical way to get into the encrypted disk image.

Ok, they could infect the boot image or put a keylogger in, but a USB drive can do that too. It's nothing like hitting backspace 28 times and just logging in.

... cue the disdain for technology press...


_________________
I swallowed a bug.


Spiderpig
Veteran
Veteran

User avatar

Joined: 14 Apr 2013
Gender: Male
Posts: 7,893

25 Dec 2015, 4:23 pm

And what would that keylogger do if you don't have an Internet connection while booting?


_________________
The red lake has been forgotten. A dust devil stuns you long enough to shroud forever those last shards of wisdom. The breeze rocking this forlorn wasteland whispers in your ears, “Não resta mais que uma sombra”.


Nine7752
Toucan
Toucan

User avatar

Joined: 3 Dec 2015
Age: 62
Posts: 269
Location: North of Nowhere

26 Dec 2015, 10:36 am

The keylogger exploit would require a second physical visit. Say, the attacker puts a keylogger between your keyboard and they computer - a USB dongle like this http://www.amazon.com/KeyGrabber-USB-KeyLogger-8MB-Black/dp/B004TUBOKW/ ) . Then wait a few days.

Then when they come back to reclaim the unit, it has logged all of the keystrokes you have typed to unlock encrypted volumes, as well as any other systems, offline or online. It is probably the only feasible way (that I know) to get onto an encrypted volume.


_________________
I swallowed a bug.