• Patch Lady – 31 days of Paranoia – Day 18

    Home » Forums » Newsletter and Homepage topics » Patch Lady – 31 days of Paranoia – Day 18

    Author
    Topic
    #225584

    Today we’re taking a break from our normal paranoia to discuss a recent vulnerability.  The headlines imply that a guest user can gain admin rights vi
    [See the full post at: Patch Lady – 31 days of Paranoia – Day 18]

    Susan Bradley Patch Lady/Prudent patcher

    7 users thanked author for this post.
    Viewing 2 reply threads
    Author
    Replies
    • #225601

      Well yes, RID hijacking is a privilege escalation attack, where a non-admin can gain admin rights. That is indeed quite different from being authenticate straight to admin.

      However, lots of organizations have users with access levels other than “none” and “admin”, and that’s where RID hijacking becomes a problem.

    • #225665

      Libssh sounds like Linux terminology to me. Is this a Linux vulnerability, a Windows vulnerability, or both?

      -- rc primak

      • #225687

        If the defective libssh is used in a Linux server role, yes. I do not know if Microsoft used any of the libssh code.

      • #225688

        There might exist Windows programs which are using the indicated defective libssh.

    • #225698

      The libssh, while disturbing, isn’t quite as bad as it appears at first glance.

      Sites like github were not vulnerable because they didn’t use the affected libraries.  Distros which use libssh2, such as RHEL6 and RHEL7, are not affected.

      Should you check your systems?  Absolutely, and patch them if you happen to be running a vulnerable version.

    Viewing 2 reply threads
    Reply To: Patch Lady – 31 days of Paranoia – Day 18

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: