Dirty Cow : Linux Most Dangerous Bug

Oct 25, 2016 | 11:22 am

Published by | Chandan Singh

dirty-cow-bug-cyberops

Linux Operating System seen as a high levels of security which is immune to bugs and crashes. Though it has high levels of security, but the fact is in addition there are problems with this operating system.

The most recent drawback found out is in the nucleus and there they have stayed for the past 9 years. The Dirty Cow impacts all distributions and their severity level is very high.

This inability, Dirty Cow, could be seen as only a flaw that was present in the Linux kernel. Using its name being derived from the function that is explored, Copy On Create, allows attackers to gain privileges within the system and therefore have access to all accounts and all functions.

Red Hat, the leading open source software developer firm, has exposed that Linux Kernel has been infected with a serious bug within the past nine years. The bug has been called as Dirty Cow. This is deemed dangerous because through this bug, an attacker can get write access to read-only memory (ROM) space.

According to Red Hat’s research, the bug was recognized in the technique used by Linux Kernel’s memory space subsystem to handle “the copy on write (COW) breakage of private read-only memory mapping. ”

With this bug attacker can simply exploit the Linux Operating System by get Write mode access to read-only memory.

When used, Dirty Cow can pry open Linux systems and give the opponent high levels of gain access to.

Worse still, the harm, in and of itself, doesn’t leave traces in the system logs. A few unknown user suddenly doing things that require main or root privileges are, of course, another matter. But, by then, it’s in its final stages.

Now Question is that can be Android also impacted by “Dirty Cow”?

Unfortunately, the answer is yes. Because Android is also a kernel depending on Linux Operating system, hence, Android Operating system also has this Dirty Cow bug. Google is already notified to the issue and allocated to its partners concerning the problem.

So be aware about that bug or vulnerabilities and subscribe us for more update……