{"id":45682,"date":"2021-07-20T17:17:41","date_gmt":"2021-07-20T21:17:41","guid":{"rendered":"http:\/\/pappp.net\/?guid=183efcc9cd5e63f5267b7df247b80479"},"modified":"2021-07-20T17:17:41","modified_gmt":"2021-07-20T21:17:41","slug":"two-for-tuesday-vulnerabilities-send-windows-and-linux-users-scrambling","status":"publish","type":"post","link":"https:\/\/pappp.net\/?p=45682","title":{"rendered":"Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling"},"content":{"rendered":"<p class=\"syndicated-attribution\">Source: <a href=\"https:\/\/arstechnica.com\/?p=1781750\">Ars Technica<\/a><\/p>\n<div style=\"background-color : #fff7d5;\n\t\t\tborder-width : 1px; padding : 5px; border-style : dashed; border-color : #e7d796;margin-bottom : 1em; color : #9a8c59;\">Article note: The windows one is a straightforward \"wrong default permissions\" thing...but that Linux exploit really is something.  A valid 1GB path name is like a million inodes on most FSes (like 5GB of junk), so it wouldn't be small or quiet, and it's just to get one semi-controlled out-of-bounds write to break the EBPF security model and run an exploit sequence from there.<\/div><div>\n<figure><img src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/09\/security-lock-computer-cyber-800x533.jpg\" alt=\"A cartoonish padlock has been photoshopped onto glowing computer chips.\" referrerpolicy=\"no-referrer\" loading=\"lazy\"\/><p><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/09\/security-lock-computer-cyber.jpg\" rel=\"noopener noreferrer\">Enlarge<\/a> <\/p>  <\/figure><div><a name=\"page-1\"><\/a><\/div>\n<p>The world woke up on Tuesday to two new vulnerabilities&mdash;one in Windows and the other in Linux&mdash;that allow hackers with a toehold in a vulnerable system to bypass OS security restrictions and access sensitive resources.<\/p>\n<p>As operating systems and applications become harder to hack, successful attacks typically require two or more vulnerabilities. One vulnerability allows the attacker access to low-privileged OS resources, where code can be executed or sensitive data can be read. A second vulnerability elevates that code execution or file access to OS resources reserved for password storage or other sensitive operations. The value of so-called local privilege escalation vulnerabilities, accordingly, has increased in recent years.<\/p>\n<h2>Breaking Windows<\/h2>\n<p>The Windows vulnerability <a href=\"https:\/\/twitter.com\/jonasLyk\/status\/1417205166172950531\" rel=\"noopener noreferrer\">came to light<\/a> by accident on Monday when a researcher observed what he believed was a coding regression in a beta version of the upcoming Windows 11. The researcher found that the contents of the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/auditing\/audit-sam\" rel=\"noopener noreferrer\">security account manager<\/a>&mdash;the database that stores user accounts and security descriptors for users on the local computer&mdash;could be read by users with limited system privileges.<\/p><\/div><p><a href=\"https:\/\/arstechnica.com\/?p=1781750#p3\" rel=\"noopener noreferrer\">Read 12 remaining paragraphs<\/a> | <a href=\"https:\/\/arstechnica.com\/?p=1781750&amp;comments=1\" rel=\"noopener noreferrer\">Comments<\/a><\/p><div>\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?a=zcicq1fYDDA:F9wud9oYI1A:V_sGLiPBpWU\" rel=\"noopener noreferrer\"><img src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?i=zcicq1fYDDA:F9wud9oYI1A:V_sGLiPBpWU\" border=\"0\" referrerpolicy=\"no-referrer\" loading=\"lazy\"\/><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?a=zcicq1fYDDA:F9wud9oYI1A:F7zBnMyn0Lo\" rel=\"noopener noreferrer\"><img src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?i=zcicq1fYDDA:F9wud9oYI1A:F7zBnMyn0Lo\" border=\"0\" referrerpolicy=\"no-referrer\" loading=\"lazy\"\/><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?a=zcicq1fYDDA:F9wud9oYI1A:qj6IDK7rITs\" rel=\"noopener noreferrer\"><img src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?d=qj6IDK7rITs\" border=\"0\" referrerpolicy=\"no-referrer\" loading=\"lazy\"\/><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?a=zcicq1fYDDA:F9wud9oYI1A:yIl2AUoC8zA\" rel=\"noopener noreferrer\"><img src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?d=yIl2AUoC8zA\" border=\"0\" referrerpolicy=\"no-referrer\" loading=\"lazy\"\/><\/a>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Enlarge<br \/>\nThe world woke up on Tuesday to two new vulnerabilities\u2014one in Windows and the other in &#8230;<\/p>\n<p> <a href=\"https:\/\/pappp.net\/?p=45682\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[226],"tags":[],"class_list":["post-45682","post","type-post","status-publish","format-standard","hentry","category-news-2"],"_links":{"self":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts\/45682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=45682"}],"version-history":[{"count":0,"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts\/45682\/revisions"}],"wp:attachment":[{"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=45682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=45682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=45682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}