Linux Security Flaw Detailed - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Linux Security Flaw Detailed

Internet Security Systems Inc. is warning Linux users of a back-door security flaw that carries ISS's highest danger rating. The company's vulnerability-assessment team, or "X-Force," as it is known, says a back-door vulnerability exists for any user running a full version of Red Hat Linux Piranha, which contains Linux Virtual Server software, a Web-based graphical user interface, as well as monitoring and failover applications. ISS and Red Hat Inc. are providing on a fix for the problem.

According to ISS, an undocumented back-door password exists in the GUI portion of Piranha that may allow remote users to execute commands on the server from a remote location and may provide access to other systems. This security flaw has been given a "5" rating, on a scale from 1 to 5, because of the flaw's inherent ability to provide damaging access to attackers. The flaw is present in version 0.4.12 of the Piranha GUI, which is part of the latest Red Hat Linux 6.2 distribution. Early versions of Red Hat are not vulnerable.

A security breach is possible even if Linux Virtual Server is not used on the system. The system is vulnerable if the affected Piranha-GUI package is installed and the administrator has not changed the password. Chris Rouland, director of X-Force for ISS in Atlanta, does not believe that the back door was installed with malicious intent, but the vulnerability does reinvigorate the debate between open-source and closed-source software.

"I think it was just an engineering mistake," says Rouland. Open- source software doesn't have "an engineering organization whose role or job it is to provide quality assurance to commercial software. The upside of open source is that everyone can see it, so if there are glaring holes, you have peer revue." Red Hat has provided updated Piranha, Piranha-doc, and Piranha-GUI packages 0.4.13-1, and recommends that administrators be sure that a new password is installed following the installation.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll