"15-Year-Old Linux Kernel Bugs Let Attackers Gain Root Privileges"
Researchers at the security company GRIMM discovered three vulnerabilities in the Linux kernel's Internet Small Computer Systems Interface (iSCSI). The exploitation of the vulnerabilities could allow local attackers with basic user privileges to become root users on unpatched Linux systems. Since the security bugs can only be exploited locally, potential attackers need to exploit another flaw or use an alternative attack vector to gain access to vulnerable devices. The bugs are 15 years old, as they were introduced in 2006 when the iSCSI kernel subsystem was in its initial development stages. According to Adam Nichols, the Principal of Software Security at GRIMM, the vulnerabilities impact all Linux distributions. Attackers can abuse the bugs to circumvent exploit-blocking security features, including Supervisor Mode Execution Protection (SMEP), Supervisor Mode Access Prevention (SMAP), Kernel Page-Table Isolation (KPTI), and Kernel Address Space Layout Randomization (KASLR). In addition to local elevation of privileges, the three vulnerabilities can result in information leaks and Denial-of-Service (DoS) attacks. This article continues to discuss the discovery, potential exploitation, and impact of the 15-year-old Linux kernel bugs.
Bleeping Computer reports "15-Year-Old Linux Kernel Bugs Let Attackers Gain Root Privileges"