Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Vulnerability in popular bootloader puts locked-down Linux computers at risk
CSO Online ^ | 16 December 2015 | Lucian Constantin

Posted on 12/17/2015 11:05:35 AM PST by ShadowAce

Pressing the backspace key 28 times can bypass the Grub2 bootloader's password protection and allow a hacker to install malware on a locked-down Linux system.

GRUB, which stands for the Grand Unified Bootloader, is used by most Linux distributions to initialize the operating system when the computer starts. It has a password feature that can restrict access to boot entries, for example on computers with multiple operating systems installed.

This protection is particularly important within organizations, where it is also common to disable CD-ROM, USB and network boot options and to set a password for the BIOS/UEFI firmware in order to secure computers from attackers who might gain physical access to the machines.

Without these boot options secured, attackers or malicious employees could simply boot from an alternative OS -- like a live Linux installation stored on a USB drive or CD/DVD -- and access files on a computer's hard drive.

Of course, it's also possible for an attacker to remove the drive and place it in another machine that doesn't have these restrictions, but there can be other physical access controls in place to prevent that.

Hector Marco and Ismael Ripoll, two researchers from the Cybersecurity Group at Universitat Politècnica de València, found an integer underflow vulnerability in Grub2 that can be triggered by pressing the backspace key 28 times when the bootloader asks for the username.

Depending on certain conditions, this can cause the machine to reboot or can put Grub in rescue mode, providing unauthenticated access to a powerful shell. Using this shell's commands, an attacker can rewrite the Grub2 code loaded in RAM to completely bypass the authentication check.

The attacker can then return Grub to its normal operation mode and have full access to edit the boot entries because the authentication check is no longer performed.

At this point multiple attack scenarios are possible, including destroying all data on the disk, but for their proof-of-concept exploit the researchers chose one that's likely to be preferred by advanced attackers: installing malware that would steal legitimate users' encrypted home folder data after they log in and unlock it.

To do this, the researchers first modified an existing boot entry to load the Linux kernel and initialize a root shell. Then they used it to replace a Mozilla Firefox library with a malicious one designed to open a reverse shell to a remote server whenever the browser is started by the user.

"When any user executes Firefox, a reverse shell will be invoked," the researchers said in a detailed write-up of their exploit, which they presented last week at the STIC CCN-CERT Conference in Madrid. "At this time all data of the user is deciphered, allowing us to steal any kind of information of the user."

Modifying the kernel to deploy a more persistent malware program is also possible, the researchers said. "The imagination is the limit."

The vulnerability, which is tracked as CVE-2015-8370, affects all versions of Grub2 from 1.98, released in December, 2009, to the current 2.02. Ubuntu, Red Hat, Debian and probably other distributions too, have released fixes for this flaw. Users are advised to install any updates they receive for the grub2 package as soon as possible.


TOPICS: Computers/Internet
KEYWORDS: grub2; linux

1 posted on 12/17/2015 11:05:35 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; Ernest_at_the_Beach; ...

2 posted on 12/17/2015 11:06:05 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Doesn't this exploit require physical access to the hardware?


3 posted on 12/17/2015 11:59:10 AM PST by so_real ( "The Congress of the United States recommends and approves the Holy Bible for use in all schools.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: so_real
Yeah, pretty much. However, GRUB comes before the kernel startup, so what's going on here is that GRUB can impose a password before it even chooses which kernel to boot (and which mode to boot into).

Having to input a GRUB password was considered a way around the "physical access means single user mode" exploit. This vulnerability puts the lie to that concept.

However, there is already a fix for this. We don't have to wait forever, or the next service pack, for a fix to be available.

4 posted on 12/17/2015 12:03:13 PM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce

However, there is already a fix for this. We don't have to wait forever, or the next service pack, for a fix to be available.

I do like that, very much :-) Thanks for the info.


5 posted on 12/17/2015 12:07:31 PM PST by so_real ( "The Congress of the United States recommends and approves the Holy Bible for use in all schools.")
[ Post Reply | Private Reply | To 4 | View Replies]

To: so_real

Doesn’t this exploit require physical access to the hardware?


Beware if your cat gets ‘radicalized’ and then wanders over to your keyboard, backspacing 28 times.

See.

Don’t be scared, but be vigilant.


6 posted on 12/17/2015 12:34:04 PM PST by Scrambler Bob (Using 4th keyboard due to wearing out the "/" and "s" on the previous 3)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Scrambler Bob
Beware if your cat gets 'radicalized' and then wanders over to your keyboard, backspacing 28 times.

Fortunately, my cats can only count to 3.

7 posted on 12/17/2015 12:45:32 PM PST by LimitedPowers (Citizenship is not a Hate Crime!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Scrambler Bob

I've had my eye on the little devil ... I see him practicing ctrl + alt + del. Of course with systemd he'll need to manage it eight times to trigger a reboot. I wonder if the systemd developers are owners of "radicalized" cats ...


8 posted on 12/17/2015 12:45:47 PM PST by so_real ( "The Congress of the United States recommends and approves the Holy Bible for use in all schools.")
[ Post Reply | Private Reply | To 6 | View Replies]

To: so_real

There was a Dilbert episode where they had a monkey ‘coding’, and other employees complained he could use his tail.

Dilbert says: “You should see him do Ctl-Alt-Del”


9 posted on 12/17/2015 12:51:37 PM PST by Scrambler Bob (Using 4th keyboard due to wearing out the "/" and "s" on the previous 3)
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson