How Attackers Can Gain Root Access On Ubuntu System

Share post:

It is now very possible for hackers to gain root access to Ubuntu systems by exploiting a double-free memory corruption bug in GNOME’s AccountsService component.

The bug, which was tracked as CVE-2021-3939, was discovered accidentally by security researcher Kevin Backhouse, who stated that the bug only affects Ubuntu’s fork of AccountsService. Affected versions include Ubuntu 21.10, Ubuntu 21.04, and Ubuntu 20.04 LTS.

Backhouse explained that “It relies on chance and the fact that I can keep crashing accountsservice until it’s successful. But would an attacker care? It gets you a root shell, even if you have to wait a few hours. To me, it feels like magic that it’s even possible to exploit such a small bug, especially considering all the mitigations that have been added to make memory corruption vulnerabilities harder to exploit. Sometimes, all it takes to get root is a little wishful thinking!”

It should be noted that this privilege escalation bug was fixed in November with the release of AccountsService versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, and 0.6.55-0ubuntu14.1.

To mitigate the flaw, users must apply the updates and, after applying the updates, restart the computer to apply the changes.

For more information, read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways