Announcement

Collapse
No announcement yet.

A vulnerability in Cryptsetup

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    A vulnerability in Cryptsetup

    http://hmarco.org/bugs/CVE-2016-4484...trd_shell.html
    vulnerability in Cryptsetup, concretely in the scripts that unlock the system partition when the partition is ciphered using LUKS (Linux Unified Key Setup). The disclosure of this vulnerability was presented as part of our talk "Abusing LUKS to Hack the System" in the DeepSec 2016 security conference, Vienna. This vulnerability allows to obtain a root initramfs shell on affected systems. The vulnerability is very reliable because it doesn't depend on specific systems or configurations. Attackers can copy, modify or destroy the hard disc as well as set up the network to exflitrate data. This vulnerability is specially serious in environments like libraries, ATMs, airport machines, labs, etc, where the whole boot process is protect (password in BIOS and GRUB) and we only have a keyboard or/and a mouse.

    Note that in cloud environments it is also possible to remotely exploit this vulnerability without having "physical access."
    Am I vulnerable ?

    If you use Debian or Ubuntu/ (probably many derived distributions are also vulnerable, but we have not tested), and you have encrypted the system partition, then your systems is vulnerable.
    The CVE then describes the fix.

    NOTE: This is NOT a remote exploit. The hacker has to have physical possession of your computer.
    Last edited by GreyGeek; Nov 15, 2016, 07:21 PM.
    "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
    – John F. Kennedy, February 26, 1962.
Working...
X