Okay, who’s giving odds on this one coming anywhere close to living up to its billing?
The claims are well into the “I found a unicorn” territory, I’m tipping its either “If you misconfigure this, its unsafe”, or its a real vuln, and its significantly harder to exploit that they are claiming.
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
Definitely interesting
Unauthenticed RCE vs all GNU/Linux systems
So this would probably be SSH related right? Otherwise what would all Linux systems have in common?
My bet is on Systemd.
That’s not all GNU/Linux though. Either the OP doesn’t understand a very common container OS, Alpine, doesn’t use systemd (also Void Linux and others outside the container space) or it’s something else.
Oh that would be baaaad
Not all Linux’s have SSH enabled, especially out of the box.
They have some other posts about IPv6 parsing (also not universal), but that doesnt sound like an “easy” RCE.
If it were SSH though, wouldn’t that ALSO include a wider blast radius than just Linux systems?
Like OpenSSH is used all over the damn place, unless I guess there’s something specific about the issue that limits it to Linux hosts for some reason?
He claims the blast radius is bigger, not just Linux. He also claims to be in talks with Apple. So the educated guess would still be openssh
It supposedly affects all GNU/Linux systems, there’s no fix, existed for 10 years, severity of 9.9, but there’s an “easy workaround”.
I’m curious.easy workaround
Turn the power off?
Rj45 to 110v adapter is more funnerer.
Me too, I’m looking forward to the writeup.
If this is true (or at least plausible to the relevant people), the author of that Twitter post will probably be on the radar of any shady government agency worldwide. Not a nice situation to be in.