An eight-year-historic worm in the web's domain Name System (DNS) would be used to extensively spread malware, in line with security researcher Dan Kaminsky. He says a flaw located within the Gnu C Standerd library, aka "glibc," can trick browsers into looking up shady domains. Servers could then reply with overly-lengthy DNS names, inflicting a buffer overflow within the victim's application. That may in flip let hackers execute code remotely and potentially take over a laptop. Whilst the gap has already been patched, Kaminksy said "the buggy code has been round for rather some time -- considering that may 2008 -- so it is rather worked its manner throughout the globe." In other phrases, it could a while for the fix to be utilized commonly.
Along with Heartbleed and others, the bug is the modern of a number of critical flaws discovered in the spine of the internet. Kaminsky stated that paradoxically, the brand new hole used to be coded into Gnu DNS libraries just months after he corrected other serious DNS flaws in 2008. He is advising someone suggest Linux servers to "patch this computer virus with extreme prejudice." (Android devices are not affected, by the way.)
Nobody is sure yet if the code can be executed remotely. However, Redhat, which discovered the vulnerability along with Google, said that "a back of the envelope analysis shows that it should be possible to write correctly formed DNS responses with attacker controlled payloads that will penetrate a DNS cache hierarchy and therefore allow attackers to exploit machines behind such caches." However, the bug makes servers vulnerable to man-in-the-middle attacks right now, if hackers gain access to certain servers. That makes it what Kaminsky calls a "solid critical vulnerability by any normal standard." Now, the only question is whether things will get much worse.
Along with Heartbleed and others, the bug is the modern of a number of critical flaws discovered in the spine of the internet. Kaminsky stated that paradoxically, the brand new hole used to be coded into Gnu DNS libraries just months after he corrected other serious DNS flaws in 2008. He is advising someone suggest Linux servers to "patch this computer virus with extreme prejudice." (Android devices are not affected, by the way.)
Nobody is sure yet if the code can be executed remotely. However, Redhat, which discovered the vulnerability along with Google, said that "a back of the envelope analysis shows that it should be possible to write correctly formed DNS responses with attacker controlled payloads that will penetrate a DNS cache hierarchy and therefore allow attackers to exploit machines behind such caches." However, the bug makes servers vulnerable to man-in-the-middle attacks right now, if hackers gain access to certain servers. That makes it what Kaminsky calls a "solid critical vulnerability by any normal standard." Now, the only question is whether things will get much worse.
0 comments:
Post a Comment