Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Vulnerability allows users to easily gain access to root privilege
- This topic has 0 replies, 1 voice, and was last updated 2 years, 5 months ago by .
-
Topic
-
A 23 month old bug that has appeared across multiple OS’s (like versions of Ubuntu, Red Hat, OpenBSD) allows for low privilege users to gain access to root. While it only takes 3 commands to reach the root privilege, it was also noted that the attacker needs an already created account and a physically attached keyboard and cannot use remote session.
You must be logged in to reply to this topic.