www.bleepingcomputer.com Open in urlscan Pro
104.20.60.209  Public Scan

Submitted URL: https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-you-root-on-every-major-distro/
Effective URL: https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/
Submission: On January 26 via api from US — Scanned from DE

Form analysis 6 forms found in the DOM

https://www.bleepingcomputer.com/search/

<form title="Search site" action="https://www.bleepingcomputer.com/search/">
  <input type="hidden" name="cx" value="partner-pub-0920899300397823:3529943228">
  <input type="hidden" name="cof" value="FORID:10">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="search" name="q" aria-label="Search Site" placeholder="Search Site">
</form>

https://www.bleepingcomputer.com/search/

<form action="https://www.bleepingcomputer.com/search/">
  <input type="hidden" name="cx" value="partner-pub-0920899300397823:3529943228">
  <input type="hidden" name="cof" value="FORID:10">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="search" name="q" aria-label="Search Site" placeholder="Search Site">
</form>

POST //bleepingcomputer.us10.list-manage.com/subscribe/post?u=3e2b3b692f780cdff40d45346&id=30c98e654e

<form action="//bleepingcomputer.us10.list-manage.com/subscribe/post?u=3e2b3b692f780cdff40d45346&amp;id=30c98e654e" method="post" target="_blank" novalidate="">
  <input type="email" name="EMAIL" aria-label="Enter email address" placeholder="Email Address...">
  <div style="position: absolute; left: -5000px;"><input type="hidden" aria-hidden="true" name="b_3e2b3b692f780cdff40d45346_30c98e654e" tabindex="-1" value=""></div>
  <input type="submit" value="Submit" class="bc_sub_btn">
</form>

POST //bleepingcomputer.us10.list-manage.com/subscribe/post?u=3e2b3b692f780cdff40d45346&id=30c98e654e

<form action="//bleepingcomputer.us10.list-manage.com/subscribe/post?u=3e2b3b692f780cdff40d45346&amp;id=30c98e654e" method="post" target="_blank" novalidate="">
  <input type="email" aria-label="Enter email address" name="EMAIL" placeholder="Email Address...">
  <div style="position: absolute; left: -5000px;"><input type="hidden" aria-hidden="true" name="b_3e2b3b692f780cdff40d45346_30c98e654e" tabindex="-1" value=""></div>
  <input type="submit" value="Submit" class="bc_sub_btn">
</form>

POST https://www.bleepingcomputer.com/forums/index.php?app=core&module=global&section=login&do=process&return=https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/

<form
  action="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;do=process&amp;return=https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/"
  method="post">
  <div class="bc_form_feild">
    <label for="ips_username">Username</label>
    <input aria-label="Enter login name" title="Enter login name" type="text" id="ips_username" name="ips_username" autocomplete="username">
  </div>
  <div class="bc_form_feild">
    <label for="ips_password">Password</label>
    <input aria-label="Enter login password" title="Enter login passwod" type="password" id="ips_password" name="ips_password" autocomplete="current-password">
  </div>
  <div class="bc_form_feild">
    <div class="bc_remember">
      <input id="remember" type="checkbox" name="rememberMe" value="1" checked="checked">
      <label for="remember">Remember Me</label>
    </div>
    <div class="bc_anon">
      <input id="anonymous" type="checkbox" name="anonymous" value="1">
      <label for="anonymous">Sign in anonymously</label>
    </div>
  </div>
  <div class="bc_btn_wrap">
    <input type="hidden" name="auth_key" value="880ea6a14ea49e853634fbdc5015a024">
    <input type="submit" aria-label="Login to site" title="Login" value="Login" class="bc_sub_btn">
    <a aria-label="Sign in with Twitter" href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;serviceClick=twitter&amp;return=https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/" class="bc_twitter_btn"><img src="https://www.bleepstatic.com/images/site/login/twitter.png" width="28" height="24" alt="Sign in with Twitter button"> Sign in with Twitter</a>
    <hr>
    <p>Not a member yet? <a aria-label="Register account" title="Register account" href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=register">Register Now</a></p>
  </div>
</form>

<form>
  <input type="hidden" id="comment-id-report" value="0">
  <ul>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Spam">Spam</label>
    </li>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Abusive or Harmful">Abusive or Harmful</label>
    </li>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Inappropriate content">Inappropriate content</label>
    </li>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Strong language">Strong language</label>
    </li>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Other">Other</label>
    </li>
    <li id="comment-report-other-reason-wrap" style="display:none;">
      <textarea aria-label="Enter other reason for reporting the comment" rows="2" cols="2" id="comment-report-other-reason"></textarea>
    </li>
  </ul>
  <p>Read our <a href="https://www.bleepingcomputer.com/posting-guidelines/">posting guidelinese</a> to learn what content is prohibited.</p>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products.

With your permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may access more
detailed information and change your preferences before consenting or to refuse
consenting. Please note that some processing of your personal data may not
require your consent, but you have a right to object to such processing. Your
preferences will apply to this website only. You can change your preferences at
any time by returning to this site or visit our privacy policy.

MORE OPTIONSAGREE
 * 
 * 
 * 



 * 
 * 
 * 



 * News
    * Featured
    * Latest
   
    * VMware: Patch Horizon servers against ongoing Log4j attacks!
   
    * New DeadBolt ransomware targets QNAP devices, asks 50 BTC for master key
   
    * New DazzleSpy malware targets macOS users in watering hole attack
   
    * Missing Microsoft Intune certs break email, VPN on Samsung devices
   
    * Chaes banking trojan hijacks Chrome with malicious extensions
   
    * White House wants US govt to use a Zero Trust security model
   
    * Windows 11 adds Android app support for everyone next month
   
    * New FluBot and TeaBot campaigns target Android devices worldwide

 * Downloads
    * Latest
    * Most Downloaded
   
    * Qualys BrowserCheck
   
    * STOPDecrypter
   
    * AuroraDecrypter
   
    * FilesLockerDecrypter
   
    * AdwCleaner
   
    * ComboFix
   
    * RKill
   
    * Junkware Removal Tool

 * Virus Removal Guides
    * Latest
    * Most Viewed
    * Ransomware
   
    * How to remove the PBlock+ adware browser extension
   
    * Remove the Toksearches.xyz Search Redirect
   
    * Remove the Smashapps.net Search Redirect
   
    * Remove the Smashappsearch.com Search Redirect
   
    * Remove Security Tool and SecurityTool (Uninstall Guide)
   
    * How to remove Antivirus 2009 (Uninstall Instructions)
   
    * How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
   
    * How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using
      TDSSKiller
   
    * Locky Ransomware Information, Help Guide, and FAQ
   
    * CryptoLocker Ransomware Information Guide and FAQ
   
    * CryptorBit and HowDecrypt Information Guide and FAQ
   
    * CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ

 * Tutorials
    * Latest
    * Popular
   
    * How to make the Start menu full screen in Windows 10
   
    * How to install the Microsoft Visual C++ 2015 Runtime
   
    * How to open an elevated PowerShell Admin prompt in Windows 10
   
    * How to Translate a Web Page in Google Chrome
   
    * How to start Windows in Safe Mode
   
    * How to remove a Trojan, Virus, Worm, or other Malware
   
    * How to show hidden files in Windows 7
   
    * How to see hidden files in Windows

 * Deals
    * Categories
   
    * eLearning
   
    * IT Certification Courses
   
    * Gear + Gadgets
   
    * Security

 * Forums
 * More
   * Startup Database
   * Uninstall Database
   * File Database
   * Glossary
   * Chat on Discord
   * Send us a Tip!
   * Welcome Guide


 * Home
 * News
 * Security
 * Linux system service bug gives root on all major distros, exploit released

 * AddThis Sharing Buttons
   Share to FacebookFacebookShare to TwitterTwitterShare to
   LinkedInLinkedInShare to RedditReddit2.4KShare to Hacker NewsHacker NewsShare
   to EmailEmail
 *  


LINUX SYSTEM SERVICE BUG GIVES ROOT ON ALL MAJOR DISTROS, EXPLOIT RELEASED

By

IONUT ILASCU

 * January 25, 2022
 * 03:44 PM
 * 1

A vulnerability in Polkit's pkexec component identified as CVE-2021-4034
(PwnKit) is present in the default configuration of all major Linux
distributions and can be exploited to gain full root privileges on the system,
researchers warn today.

CVE-2021-4034 has been named PwnKit and its origin has been tracked to the
initial commit of pkexec, more than 12 years ago, meaning that all Polkit
versions are affected.

Part of the Polkit open-source application framework that negotiates the
interaction between privileged and unprivileged processes, pkexec allows an
authorized user to execute commands as another user, doubling as an alternative
to sudo.

PLAY Top Articles Video Settings Full Screen About Connatix V147588 Read More
Read More Read More TrickBot now crashes researchers' browsers toblock malware
analysis 1/1 Skip Ad Continue watching after the ad Visit Advertiser website GO
TO PAGE




EASY TO EXPLOIT, POC EXPECTED SOON

Researchers at Qualys information security company found that the pkexec program
could be used by local attackers to increase privileges to root on default
installations of Ubuntu, Debian, Fedora, and CentOS.

They warn that PwnKit is likely exploitable on other Linux operating systems as
well.

Bharat Jogi, Director of Vulnerability and Threat Research at Qualys explains
that PwnKit is “a memory corruption vulnerability in Polkit’s, which allows any
unprivileged user to gain full root privileges on a vulnerable system using
default polkit configuration,”

The researcher notes that the issue has been hiding in plain sight since the
first version of pkexec inn May 2009. The video below demonstrates the
exploitability of the bug:



Exploiting the flaw is so easy, the researchers say, that proof-of-concept (PoC)
exploit code is expected to become public in just a few days. The Qualys
Research Team will not release a PoC for PwnKit.

Update: An exploit has already emerged in the public space, less than three
hours after Qualys published the technical details for PwnKit. BleepingComputer
has compiled and tested the available exploit, which proved to be reliable as it
gave us root privileges on the system on all attempts.

source: BleepingComputer

Referrinng to the exploit, CERT/CC vulnerability analyst Will Dormann said that
it is both simple and universal. The researcher further tested it on an ARM64
system, showing that it works on that architecture, too.

Qualys reported the security issue responsibly on November 18, 2021, and waited
for a patch to become available before publishing the technical details behind
PwnKit.

The company strongly recommends administrators prioritize applying the patches
that Polkit’s authors released on their GitLab a couple of hours ago.

Linux distros had access to the patch a couple of weeks before today’s
coordinated disclosure from Qualys and are expected to release updated pkexec
packages starting today.

Ubuntu has already pushed updates for PolicyKit to address the vulnerability in
versions 14.04 and 16.04 ESM (extended security maintenance) as well as in more
recent versions 18.04, 20.04, and 21.04. Users just need to run a standard
system update and then reboot the computer for the changes to take effect.

Red Hat has also delivered a security update for polkit on Workstation and on
Enterprise products for supported architectures, as well as for extended life
cycle support, TUS, and AUS.

A temporary mitigation for operating systems that have yet to push a patch is to
use the following command to strip pkexec of the setuid bit:

chmod 0755 /usr/bin/pkexec

Users that want to look for signs of PwnKit exploitation can do it by checking
the logs for either “The value for the SHELL variable was not found the
/etc/shells file” or “The value for environment variable […] contains suspicious
content.” entries.

However, Qualys notes that exploiting PwnKit is possible without leaving a
trace.

Last year, GitHub Security Lab researcher Kevin Backhouse discovered another old
privilege escalation vulnerability affecting Polkit.

The bug had been present for seven years, since version 0.113 of the component
and affected popular Linux distros including RHEL 8, Fedora 21 (or later),
Ubuntu 20.04, and unstable versions of Debian ('bullseye') and its derivatives.

Update [January 25, 17:26 EST]: Added security notices on PolicyKit / Polkit
from Ubuntu and Red Hat.

Update [January 25, 17:43 EST]: Article updated with information about
proof-of-concept exploit code being publicly available.


RELATED ARTICLES:

Attackers can get root by crashing Ubuntu’s AccountsService

CWP bugs allow code execution as root on Linux servers, patch now

800K WordPress sites still impacted by critical SEO plugin flaw

27 flaws in USB-over-network SDK affect millions of cloud users

UK govt releasing Nmap scripts to find unpatched vulnerabilities


 * CVE-2021-4034
 * Linux
 * pkexec
 * polkit
 * Privilege Escalation
 * PwnKit
 * Root
 * Vulnerability

 * Facebook
 * Twitter
 * LinkedIn

 * Email
 * 



IONUT ILASCU

Ionut Ilascu is a technology writer with a focus on all things cybersecurity.
The topics he writes about include malware, vulnerabilities, exploits and
security defenses, as well as research and innovation in information security.
His work has been published by Bitdefender, Netgear, The Security Ledger and
Softpedia.
 * Previous Article
 * Next Article


COMMENTS

 * KENSETTLE949 - 5 HOURS AGO
   
    *  
    *  
   
   That chmod would strip setuid and setgid permissions (to act as another user
   or group) from pkexec, but you would probably need to be root or add a sudo
   to run it.
   
   In an ideal world, the patches would already be applied and updates available
   BEFORE the disclosure of something so easily exploited. I wonder why three
   months was not long enough for this to happen in this case.

POST A COMMENT COMMUNITY RULES

YOU NEED TO LOGIN IN ORDER TO POST A COMMENT

Not a member yet? Register Now


YOU MAY ALSO LIKE:

Popular Stories

 * Google Drive flags nearly empty files for 'copyright infringement'

 * Android malware BRATA wipes your device after stealing data



NEWSLETTER SIGN UP

To receive periodic updates and news from BleepingComputer, please use the form
below.





NEWSLETTER SIGN UP


 * Follow us:
 * 
 * 
 * 
 * 

MAIN SECTIONS

 * News
 * Downloads
 * Virus Removal Guides
 * Tutorials
 * Startup Database
 * Uninstall Database
 * File Database
 * Glossary

COMMUNITY

 * Forums
 * Forum Rules
 * Chat

USEFUL RESOURCES

 * Welcome Guide
 * Sitemap

COMPANY

 * About BleepingComputer
 * Contact Us
 * Send us a Tip!
 * Advertising
 * Write for BleepingComputer
 * Social & Feeds
 * Changelog

Terms of Use - Privacy Policy - Ethics Statement

Copyright @ 2003 - 2022 Bleeping Computer® LLC - All Rights Reserved



LOGIN

Username
Password
Remember Me
Sign in anonymously
Sign in with Twitter

--------------------------------------------------------------------------------

Not a member yet? Register Now

REPORTER

HELP US UNDERSTAND THE PROBLEM. WHAT IS GOING ON WITH THIS COMMENT?

 * Spam
 * Abusive or Harmful
 * Inappropriate content
 * Strong language
 * Other
 * 

Read our posting guidelinese to learn what content is prohibited.

Submitting...
SUBMIT