Overview
On this week’s episode we dive into the Shikitega Linux malware report from AT&T
Alien Labs, plus we cover security updates for the Linux kernel, curl and
Zstandard as well as some open positions on the team. Join us!
This week in Ubuntu Security Updates
[USN-5591-1, USN-5591-2, USN-5591-3, USN-5591-4, USN-5597-1, USN-5598-1] Linux kernel (+ HWE, AWS, Oracle) vulnerability [00:47]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)CVE-2021-33656 OOB write in virtual terminal driver when changing VGA console fonts - coveredback in USN-5580-1 - Linux kernel (AWS) vulnerabilities - in Episode 175
[USN-5592-1, USN-5595-1, USN-5596-1, USN-5600-1] Linux kernel (+ OEM, HWE) vulnerabilities [01:04]
2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2021-33656 CVE-2021-33061 OOB write in virtual terminal driver when changing VGA console fontsImproper control flow mgmt in Intel 10GbE PCIe driver - local DoS[USN-5594-1, USN-5599-1] Linux kernel (+ Oracle) vulnerabilities [01:28]
9 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-2959 CVE-2022-2873 CVE-2022-2503 CVE-2022-1973 CVE-2022-1943 CVE-2022-1852 CVE-2022-1729 CVE-2022-1012 CVE-2021-33061 Above issues plus:NULL pointer deref in KVM on host if a VM tried to execute an illegal instructionOOB write in UDF file-system driverUAF in NFTS under certain error conditionsOOB write in Intel SMBus host controller driverRace condition in handling of pipe buffers -> OOB[USN-5587-1] curl vulnerability [02:12]
1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)CVE-2022-35252 Cookies generally contain NAME=VALUE pairs using ASCII chars for bothASCII character set contains usual A-Za-z0-9 and punctuation (space, “!#&)plus a bunch of control codes - NUL, BEL, LF, CR, HT (\t) and more
These have a byte value below 32curl since 4.9 would accept cookies with control codesAs with cookies, these get sent back to the server on subsequent requestsOver time web servers have started rejecting cookies with control codes andreturning a HTTP 400 response code (Bad Request)
As such, a malicious “sister site” could return a cookie with control codesinside it, this then would get sent by curl to other sites in the same domain,
which would then reject the request and effectively DoS the user
Fixed to have curl validate and then reject such cookies in the first place[USN-5593-1] Zstandard vulnerability [04:34]
1 CVEs addressed in Xenial ESM (16.04 ESM)CVE-2019-11922 Originally discussed all the way back in Episode 44 - [USN-4108-1] Zstandardvulnerability
Race condition when using single-pass compression, might allow attackerto get OOB write IF the caller had provided a smaller output buffer than
the recommended size
So likely won’t affect all packages which use zstd (there are many) -should always follow best practice
Goings on in Ubuntu Security Community
AT&T Alien Labs teardown of Shikitega Linux malware [05:40]
https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linuxTargets endpoints and IoT devices running LinuxUses multiple different binaries to achieve its purpose - each does one taskof the process
Uses various components of Metasploit along the wayFramework containing various exploits plus different tools to help developexploits as well as scan environments etc
Initial dropper is a very small binary that is encoded using one of thestandard Metasploit encoders to help it evade detection from AV scanners etc
Decodes basic shellcode to open a socket to the C2 server and downloadsadditional shellcode to run plus the mettle interpreter so that it can make
use of off-the-shelf components from Metasploit in further stages
Also downloads the next stage dropperThis again is encoded the same as the first component - contained within isshellcode to spawn a shell via /bin/sh - from this shell it then attempts to
run commands to exploit two known privesc vulns - CVE-2021-4034
([USN-5252-1, USN-5252-2] PolicyKit vulnerability from Episode 147) and
CVE-2021-3493 ([USN-4916-2] Linux kernel vulnerability in Episode 113)
Once has gained root privileges via these vulns, with then move on to achievepersistence and execute the primary payload - cryptominer
Persistence is achieved simply by using cron to download the cryptominer fromC2 on boot - and then another cron job to execute the cryptominer - and this
is done for both the standard user and root
As such the only traces left on the machine at reboot is the crontabscryptominer is the XMRig and is configured to mine MoneroC2 is seemingly fronted by cloudflare and cloudfrontNo details provided on initial compromise but is good to see details on theprivesc vulns - both of these were patched in Ubuntu quite a while ago - and
we released a Livepatch for the kernel privesc too - shows the value in such
services - can still stay protected against the kind of vulnerabilities that
attackers are actually exploiting without the need to reboot
Shows the increasing prevalence of Linux malware (and the resulting interestin it from organisations like AT&T) but also the value in ensuring systems are
kept updated
systemd/open-vm-tools regression for Ubuntu 18.04 LTS [10:56]
Had mentioned last week that I would likely cover this - is still awork-in-progress so hopefully next week 🤞
Hiring [11:30]
https://canonical.com/careers/engineering?search=securitySecurity Certifications Product ManagerHome based, EMEASecurity Engineer - UbuntuHome based, worldwideUbuntu Security ManagerHome based, worldwideGet in contact
#ubuntu-security on the Libera.Chat IRC networkubuntu-hardened mailing listSecurity section on discourse.ubuntu.com@ubuntu_sec on twitter