Skip to main content

Code-execution flaws threaten users of routers, Linux, and other OSes

posted onOctober 4, 2017
by l33tdawg

Google researchers have discovered at least three software bugs in a widely used software package that may allow hackers to execute malicious code on vulnerable devices running Linux, FreeBSD, OpenBSD, NetBSD, and macOS, as well as proprietary firmware.

Dnsmasq, as the package is known, provides code that makes it easier for networked devices to communicate using the domain name system and the Dynamic Host Configuration Protocol. It's included in Android, Ubuntu, and most other Linux distributions, and it can also run on a variety of other operating systems and in router firmware. A blog post published Monday by security researchers with Google said they recently found seven vulnerabilities in Dnsmasq, three of which were flaws that allowed the remote execution of malicious code.

One of the code-execution flaws, indexed as CVE-2017-14493, is a "trivial-to-exploit, DHCP-based, stack-based buffer overflow vulnerability." Combined with a separate information leak bug Google researchers also discovered, attackers can bypass a key protection known as address space layout randomization, which is designed to prevent malicious payloads included in exploits from executing. As a result, exploits result in a simple crash, rather than a security-compromising hack. By chaining the code-execution and information leak exploits together, attackers can circumvent the defense to run any code of their choosing.



Linux Security

You May Also Like

Recent News

Friday, April 20th

Wednesday, April 11th

Tuesday, April 10th

Monday, April 9th

Saturday, April 7th

Friday, April 6th

Thursday, April 5th

Wednesday, April 4th