Warning

 

Close

Confirm Action

Are you sure you wish to do this?

Confirm Cancel
BCM
User Panel

Posted: 2/24/2016 2:26:34 PM EDT
http://www.ibtimes.co.uk/google-red-hat-discover-critical-dns-security-flaw-that-enables-malware-infect-entire-internet-1545687

Google engineers and Red Hat researchers both independently discovered the DNS bug within the Gnu C standard library (glibc) called CVE-2015-7547, and then worked together to create a patch. The security vulnerability works by tricking browsers into looking up suspicious domains, which causes servers to reply with DNS names that are far too long, thus causing a buffer overflow in the victim's software.

The buffer overflow would then make it possible for an attacker to remotely execute code and take over the computer, and they could perform this exact same attack on machines all over the world, as the code containing the flaw has been in use since May 2008 and affected all versions of glibc since version 2.9.

Flaw can affect almost all parts of internet infrastructure

To understand how damaging this flaw could be, security researcher Dan Kaminsky explains on his blog that it is far worse than the Heartbleed OpenSSL bug or Shellshock Linux Bash and Mac OS X bug, which infected things connected to a network, rather than everything that makes up the internet, such as network tools and even software.
View Quote
Link Posted: 2/24/2016 2:28:17 PM EDT
[#1]
Ohhh boy.
Link Posted: 2/24/2016 2:28:54 PM EDT
[#2]
SKYNET
Link Posted: 2/24/2016 2:30:18 PM EDT
[#3]
Worse than Y2K.

Posted Via AR15.Com Mobile
Link Posted: 2/24/2016 2:30:55 PM EDT
[#4]
Wasn't this a week or two ago or am I thinking of a different bug?
Link Posted: 2/24/2016 2:33:39 PM EDT
[#5]
"If only it was written in Javascript..."
Link Posted: 2/24/2016 2:36:27 PM EDT
[#6]
THE ENTIRE INTERNETS!!!!!!!OH NOES!!!!!!!!!!!!!!!!
Link Posted: 2/24/2016 2:36:40 PM EDT
[#7]
Link Posted: 2/24/2016 2:39:03 PM EDT
[#8]
Meh, nothing that bad. Easily patched, only affects linux machines.



Ironic windows machine aren't affected
Link Posted: 2/24/2016 2:41:19 PM EDT
[#9]
Quoted:
http://www.ibtimes.co.uk/google-red-hat-discover-critical-dns-security-flaw-that-enables-malware-infect-entire-internet-1545687

Google engineers and Red Hat researchers both independently discovered the DNS bug within the Gnu C standard library (glibc) called CVE-2015-7547, and then worked together to create a patch. The security vulnerability works by tricking browsers into looking up suspicious domains, which causes servers to reply with DNS names that are far too long, thus causing a buffer overflow in the victim's software.

The buffer overflow would then make it possible for an attacker to remotely execute code and take over the computer, and they could perform this exact same attack on machines all over the world, as the code containing the flaw has been in use since May 2008 and affected all versions of glibc since version 2.9.

Flaw can affect almost all parts of internet infrastructure

To understand how damaging this flaw could be, security researcher Dan Kaminsky explains on his blog that it is far worse than the Heartbleed OpenSSL bug or Shellshock Linux Bash and Mac OS X bug, which infected things connected to a network, rather than everything that makes up the internet, such as network tools and even software.
View Quote
View Quote


Interesting first post...
Link Posted: 2/24/2016 2:47:31 PM EDT
[#10]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Meh, nothing that bad. Easily patched, only affects linux machines.

Ironic windows machine aren't affected
View Quote

LAMP runs the internet.
Link Posted: 2/24/2016 2:49:21 PM EDT
[#11]
Discussion ForumsJump to Quoted PostQuote History
Quoted:

LAMP runs the internet.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Meh, nothing that bad. Easily patched, only affects linux machines.

Ironic windows machine aren't affected

LAMP runs the internet.


Link Posted: 2/25/2016 7:55:42 AM EDT
[#12]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


Interesting first post...
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
http://www.ibtimes.co.uk/google-red-hat-discover-critical-dns-security-flaw-that-enables-malware-infect-entire-internet-1545687

Google engineers and Red Hat researchers both independently discovered the DNS bug within the Gnu C standard library (glibc) called CVE-2015-7547, and then worked together to create a patch. The security vulnerability works by tricking browsers into looking up suspicious domains, which causes servers to reply with DNS names that are far too long, thus causing a buffer overflow in the victim's software.

The buffer overflow would then make it possible for an attacker to remotely execute code and take over the computer, and they could perform this exact same attack on machines all over the world, as the code containing the flaw has been in use since May 2008 and affected all versions of glibc since version 2.9.

Flaw can affect almost all parts of internet infrastructure

To understand how damaging this flaw could be, security researcher Dan Kaminsky explains on his blog that it is far worse than the Heartbleed OpenSSL bug or Shellshock Linux Bash and Mac OS X bug, which infected things connected to a network, rather than everything that makes up the internet, such as network tools and even software.


Interesting first post...

and user name.  page?
Link Posted: 2/25/2016 7:59:25 AM EDT
[#13]
Norcal to aisle 5 for cleanup!
Close Join Our Mail List to Stay Up To Date! Win a FREE Membership!

Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!

You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.


By signing up you agree to our User Agreement. *Must have a registered ARFCOM account to win.
Top Top