{"id":1947,"date":"2018-10-29T22:25:14","date_gmt":"2018-10-29T22:25:14","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=1947"},"modified":"2018-10-31T10:01:58","modified_gmt":"2018-10-31T10:01:58","slug":"the-d-in-systemd-stands-for-dammmmit-a-nasty-dhcpv6-packet-can-pwn-a-vulnerable-linux-box","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/29\/the-d-in-systemd-stands-for-dammmmit-a-nasty-dhcpv6-packet-can-pwn-a-vulnerable-linux-box\/","title":{"rendered":"The D in Systemd stands for &#8216;Dammmmit!&#8217; A nasty DHCPv6 packet can pwn a vulnerable Linux box &#8211; The Register"},"content":{"rendered":"<h2>Hole opens up remote-code execution to miscreants \u2013 or a crash, if you&#8217;re lucky<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/04\/20\/sad_penguin_photo_via_shutterstock.jpg?x=442&amp;y=293&amp;crop=1\" alt=\"Sad penguin photo via Shutterstock\" width=\"442\" height=\"293\" \/><\/p>\n<p>A security bug in Systemd can be exploited over the network to, at best, potentially crash a vulnerable Linux machine, or, at worst, execute malicious code on the box.<\/p>\n<p>The flaw therefore puts Systemd-powered Linux computers \u2013 specifically those using systemd-networkd \u2013 at risk of remote hijacking: maliciously crafted DHCPv6 packets can try to exploit the programming cockup and arbitrarily change parts of memory in vulnerable systems, leading to potential code execution. This code could install malware, spyware, and other nasties, if successful.<\/p>\n<p>The vulnerability \u2013 which was made public this week \u2013 sits within the written-from-scratch DHCPv6 client of the open-source Systemd management suite, which is built into various flavors of Linux.<\/p>\n<p>This client is activated automatically if IPv6 support is enabled, and relevant packets arrive for processing. Thus, a rogue DHCPv6 server on a network, or in an ISP, could emit specially crafted router advertisement messages that wake up these clients, exploit the bug, and possibly hijack or crash vulnerable Systemd-powered Linux machines.<\/p>\n<p>Here&#8217;s the Red Hat Linux <a href=\"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2018-15688\" target=\"_blank\" rel=\"noopener\">summary<\/a>:<\/p>\n<p>Felix Wilhelm, of the Google Security team, was credited with discovering the flaw, designated <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-15688\" target=\"_blank\" rel=\"noopener\">CVE-2018-15688<\/a>. Wilhelm <a href=\"https:\/\/bugs.launchpad.net\/ubuntu\/+source\/systemd\/+bug\/1795921\" target=\"_blank\" rel=\"noopener\">found that<\/a> a specially crafted DHCPv6 network packet could trigger &#8220;a very powerful and largely controlled out-of-bounds heap write,&#8221; which could be used by a remote hacker to inject and execute code.<\/p>\n<p>&#8220;The overflow can be triggered relatively easy by advertising a DHCPv6 server with a server-id &gt;= 493 characters long,&#8221; Wilhelm noted.<\/p>\n<p>In addition to <a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/2018\/CVE-2018-15688.html\" target=\"_blank\" rel=\"noopener\">Ubuntu<\/a> and Red Hat Enterprise Linux, Systemd has been adopted as a service manager for Debian, Fedora, CoreOS, Mint, and SUSE Linux Enterprise Server. We&#8217;re told RHEL 7, at least, does not use the vulnerable component by default.<\/p>\n<p>Systemd creator Lennart Poettering has <a href=\"https:\/\/github.com\/poettering\/systemd\/commit\/49653743f69658aeeebdb14faf1ab158f1f2cb20\" target=\"_blank\" rel=\"noopener\">already published<\/a> a <a href=\"https:\/\/github.com\/systemd\/systemd\/pull\/10518\" target=\"_blank\" rel=\"noopener\">security fix<\/a> for the vulnerable component \u2013 this should be weaving its way into distros as we type.<\/p>\n<p>If you run a Systemd-based Linux system, and rely on systemd-networkd, update your operating system as soon as you can to pick up the fix when available and as necessary.<\/p>\n<p>The bug will come as another argument against Systemd as the Linux management tool continues to fight for the hearts and minds of admins and developers alike. Though a number of major admins have in recent years <a href=\"https:\/\/www.theregister.co.uk\/2018\/05\/10\/red_hat_systemd\/\" target=\"_blank\" rel=\"noopener\">adopted and championed<\/a> it as the replacement for the old Init era, others within the Linux world seem to still be <a href=\"https:\/\/www.theregister.co.uk\/2017\/07\/17\/linux_4_13_rc1\/\" target=\"_blank\" rel=\"noopener\">less than impressed<\/a> with Systemd and Poettering&#8217;s <a href=\"https:\/\/www.theregister.co.uk\/2017\/07\/28\/black_hat_pwnie_awards\/\" target=\"_blank\" rel=\"noopener\">occasionally controversial<\/a> management of the tool. \u00ae<\/p>\n<p><a href=\"http:\/\/lxer.com\/module\/newswire\/ext_link.php?rid=262270\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hole opens up remote-code execution to miscreants \u2013 or a crash, if you&#8217;re lucky A security bug in Systemd can be exploited over the network to, at best, potentially crash a vulnerable Linux machine, or, at worst, execute malicious code on the box. The flaw therefore puts Systemd-powered Linux computers \u2013 specifically those using systemd-networkd &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/29\/the-d-in-systemd-stands-for-dammmmit-a-nasty-dhcpv6-packet-can-pwn-a-vulnerable-linux-box\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The D in Systemd stands for &#8216;Dammmmit!&#8217; A nasty DHCPv6 packet can pwn a vulnerable Linux box &#8211; The Register&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1947","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/1947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=1947"}],"version-history":[{"count":1,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/1947\/revisions"}],"predecessor-version":[{"id":2174,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/1947\/revisions\/2174"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=1947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=1947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=1947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}