New Linux Kernel Bug Affects Red Hat, CentOS, and Debian Distributions

Security researchers have published the details and proof-of-concept (PoC) exploits of an integer overflow vulnerability in the Linux kernel that could allow an unprivileged user to gain superuser access to the targeted system.

The vulnerability, disc… Continue reading New Linux Kernel Bug Affects Red Hat, CentOS, and Debian Distributions

New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

Remember SambaCry?

Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines.

We dubbed the… Continue reading New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug Discovered

Update: Find working Exploits and Proof-of-Concepts at the bottom of this article.

Security researchers have discovered more than a decade-old vulnerability in several Unix-based operating systems — including Linux, OpenBSD, NetBSD, FreeBSD and Solaris — which can be exploited by attackers to escalate their privileges to root, potentially leading to a full system takeover.

Dubbed Stack Clash

Continue reading A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug Discovered

Bypass Linux Disk Encryption Just By Pressing ‘ENTER’ for 70 Seconds

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds.

The result? The act grants the hacker a shell with root privileges, which allows them to g… Continue reading Bypass Linux Disk Encryption Just By Pressing ‘ENTER’ for 70 Seconds

This Hack Gives Linux Root Shell Just By Pressing ‘ENTER’ for 70 Seconds

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds.

The result? The act grants the hacker a shell with root privileges, which allows them to g… Continue reading This Hack Gives Linux Root Shell Just By Pressing ‘ENTER’ for 70 Seconds

Shadow Brokers reveals list of Servers Hacked by the NSA

The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking tools and exploits, is back with a Bang!

The Shadow Brokers published more files today, and this time the group dumped a list of foreign servers allegedly compromised by the NSA-linked hacking unit, Equation Group, in various countries to expand its espionage operations.

Continue reading Shadow Brokers reveals list of Servers Hacked by the NSA

Dirty COW — Critical Linux Kernel Flaw Being Exploited in the Wild

A nine-year-old critical vulnerability has been discovered in virtually all versions of the Linux operating system and is actively being exploited in the wild.

Dubbed “Dirty COW,” the Linux kernel security flaw (CVE-2016-5195) is a mere privilege-esca… Continue reading Dirty COW — Critical Linux Kernel Flaw Being Exploited in the Wild

The Linux glibc Exploit – What You Need To Know

So the Internet exploded this week with news of a pretty serious glibc exploit, something that everyone pays attention to as every Linux server uses this library and in some cases it can yield remote code execution. In basic terms the glibc DNS client (libresolv) is vulnerable to a stack-based buffer overflow when the getaddrinfo() […]

The…

Read the full post at darknet.org.uk

Continue reading The Linux glibc Exploit – What You Need To Know