Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. #copyfail

#copyfail

Scheduled Pinned Locked Moved Uncategorized
copyfail
39 Posts 13 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • viss@mastodon.socialV viss@mastodon.social

    @cR0w @rootwyrm @da_667 @reverseics yes

    da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchange
    wrote last edited by
    #24

    @Viss @cR0w @rootwyrm @reverseics and I'm tired of pretending its not

    1 Reply Last reply
    0
    • viss@mastodon.socialV viss@mastodon.social

      @rootwyrm @cR0w @da_667 @reverseics its amusing that "firewall appliances" are going to have more surfaces exposed to exploit this thing than linux boxes

      paul_ipv6@infosec.exchangeP This user is from outside of this forum
      paul_ipv6@infosec.exchangeP This user is from outside of this forum
      paul_ipv6@infosec.exchange
      wrote last edited by
      #25

      @Viss @rootwyrm @cR0w @da_667 @reverseics

      *what*? perimeter and middleware boxen as platforms to exploite? surely not. they are *security* devices, so they must be more secure!

      *choke* *gasp* *cough*

      ok. couldn't get that all out with a straight face...

      🍿🍿🍿

      viss@mastodon.socialV 1 Reply Last reply
      0
      • viss@mastodon.socialV viss@mastodon.social

        right now, every single remote code vuln that will lead to command injection or rce will make this #copyfail thing a very very big deal.

        so all those qa servers and staging servers and test boxes you think nobody gives a shit about that are just flapping out there in the public, not being logged, not in the siem, not getting alerted on, not getting patched?

        all those are gonna catch the "oops attackers overwrote sshd to steal creds" disease.

        or cryptominers. or proxies.

        bhhaskin@social.bitsofsimplicity.comB This user is from outside of this forum
        bhhaskin@social.bitsofsimplicity.comB This user is from outside of this forum
        bhhaskin@social.bitsofsimplicity.com
        wrote last edited by
        #26

        @Viss just think of all the WordPress sites with RCE there where pretty useless up until now.

        viss@mastodon.socialV 1 Reply Last reply
        0
        • viss@mastodon.socialV viss@mastodon.social

          this is why ive been on a tear about architectural defensive measures, and adversarial defensive measures.

          because when you build shit from the ground up to be defensively positioned at the architecture layer, this shit is way harder to exploit - purely because its way less accessible.

          every k8s cluster out there right now with alpine linux rocking kernel 6.7 or whatever is kindling for this thing.

          onyxraven@hachyderm.ioO This user is from outside of this forum
          onyxraven@hachyderm.ioO This user is from outside of this forum
          onyxraven@hachyderm.io
          wrote last edited by
          #27

          @Viss or be ready for supply chain exploits doing this to dependencies or typosquats. Then pushing that into containers. That’s the path I’m concerned about

          viss@mastodon.socialV 1 Reply Last reply
          0
          • onyxraven@hachyderm.ioO onyxraven@hachyderm.io

            @Viss or be ready for supply chain exploits doing this to dependencies or typosquats. Then pushing that into containers. That’s the path I’m concerned about

            viss@mastodon.socialV This user is from outside of this forum
            viss@mastodon.socialV This user is from outside of this forum
            viss@mastodon.social
            wrote last edited by
            #28

            @onyxraven there are so many angles on this thing

            1 Reply Last reply
            0
            • bhhaskin@social.bitsofsimplicity.comB bhhaskin@social.bitsofsimplicity.com

              @Viss just think of all the WordPress sites with RCE there where pretty useless up until now.

              viss@mastodon.socialV This user is from outside of this forum
              viss@mastodon.socialV This user is from outside of this forum
              viss@mastodon.social
              wrote last edited by
              #29

              @bhhaskin yeah now you can shell the host its on, theeeeeeeen its a party

              bhhaskin@social.bitsofsimplicity.comB 1 Reply Last reply
              0
              • paul_ipv6@infosec.exchangeP paul_ipv6@infosec.exchange

                @Viss @rootwyrm @cR0w @da_667 @reverseics

                *what*? perimeter and middleware boxen as platforms to exploite? surely not. they are *security* devices, so they must be more secure!

                *choke* *gasp* *cough*

                ok. couldn't get that all out with a straight face...

                🍿🍿🍿

                viss@mastodon.socialV This user is from outside of this forum
                viss@mastodon.socialV This user is from outside of this forum
                viss@mastodon.social
                wrote last edited by
                #30

                @paul_ipv6 @rootwyrm @cR0w @da_667 @reverseics i am eager to see godaddy catch fire sometime in the near future

                1 Reply Last reply
                0
                • viss@mastodon.socialV viss@mastodon.social

                  this fixed it for me:

                  cat >/etc/modprobe.d/disable-algif-aead.conf <<'EOF'
                  install algif_aead /bin/false
                  blacklist algif_aead
                  EOF

                  depmod -a

                  rmmod algif_aead

                  i tested with this: https://github.com/rootsecdev/cve_2026_31431

                  mirabilos@toot.mirbsd.orgM This user is from outside of this forum
                  mirabilos@toot.mirbsd.orgM This user is from outside of this forum
                  mirabilos@toot.mirbsd.org
                  wrote last edited by
                  #31

                  @Viss you don’t need to depmod

                  1 Reply Last reply
                  0
                  • viss@mastodon.socialV viss@mastodon.social

                    @bhhaskin yeah now you can shell the host its on, theeeeeeeen its a party

                    bhhaskin@social.bitsofsimplicity.comB This user is from outside of this forum
                    bhhaskin@social.bitsofsimplicity.comB This user is from outside of this forum
                    bhhaskin@social.bitsofsimplicity.com
                    wrote last edited by
                    #32

                    @Viss I am betting some state sponsored agencies are not very happy tonight. Same with sys admins and IT departments everywhere lol

                    viss@mastodon.socialV 1 Reply Last reply
                    0
                    • bhhaskin@social.bitsofsimplicity.comB bhhaskin@social.bitsofsimplicity.com

                      @Viss I am betting some state sponsored agencies are not very happy tonight. Same with sys admins and IT departments everywhere lol

                      viss@mastodon.socialV This user is from outside of this forum
                      viss@mastodon.socialV This user is from outside of this forum
                      viss@mastodon.social
                      wrote last edited by
                      #33

                      @bhhaskin oh im 100% sure theres some absolute shithouse madness going on behind the scenes somewhere.

                      theres probably also a teeeeenyy tiny subset of folks whove been sitting on this bug for ten years who are now super fuckin pissed its burned

                      and if any of them can see this, my condolences and hat tip me somewhere incase vault7 ever happens again. nerds love it when they get quiet shoutouts like that.

                      bhhaskin@social.bitsofsimplicity.comB 1 Reply Last reply
                      0
                      • viss@mastodon.socialV viss@mastodon.social

                        @bhhaskin oh im 100% sure theres some absolute shithouse madness going on behind the scenes somewhere.

                        theres probably also a teeeeenyy tiny subset of folks whove been sitting on this bug for ten years who are now super fuckin pissed its burned

                        and if any of them can see this, my condolences and hat tip me somewhere incase vault7 ever happens again. nerds love it when they get quiet shoutouts like that.

                        bhhaskin@social.bitsofsimplicity.comB This user is from outside of this forum
                        bhhaskin@social.bitsofsimplicity.comB This user is from outside of this forum
                        bhhaskin@social.bitsofsimplicity.com
                        wrote last edited by
                        #34

                        @Viss what do you think, about a billion dollars in OT tonight?

                        (Just kidding, IT doesn't get OT)

                        viss@mastodon.socialV 1 Reply Last reply
                        0
                        • bhhaskin@social.bitsofsimplicity.comB bhhaskin@social.bitsofsimplicity.com

                          @Viss what do you think, about a billion dollars in OT tonight?

                          (Just kidding, IT doesn't get OT)

                          viss@mastodon.socialV This user is from outside of this forum
                          viss@mastodon.socialV This user is from outside of this forum
                          viss@mastodon.social
                          wrote last edited by
                          #35

                          @bhhaskin ot may have shit so old it predates this bug, but also most ot is weird custom bullshit and not the linux kernel, which is largely already a massive problem for ot

                          1 Reply Last reply
                          0
                          • viss@mastodon.socialV viss@mastodon.social

                            right now, every single remote code vuln that will lead to command injection or rce will make this #copyfail thing a very very big deal.

                            so all those qa servers and staging servers and test boxes you think nobody gives a shit about that are just flapping out there in the public, not being logged, not in the siem, not getting alerted on, not getting patched?

                            all those are gonna catch the "oops attackers overwrote sshd to steal creds" disease.

                            or cryptominers. or proxies.

                            fritzadalis@infosec.exchangeF This user is from outside of this forum
                            fritzadalis@infosec.exchangeF This user is from outside of this forum
                            fritzadalis@infosec.exchange
                            wrote last edited by
                            #36

                            @Viss
                            So you mean that Internet-facing Debian 8 box they refuse to turn off is fucked?

                            viss@mastodon.socialV 1 Reply Last reply
                            0
                            • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                              @Viss
                              So you mean that Internet-facing Debian 8 box they refuse to turn off is fucked?

                              viss@mastodon.socialV This user is from outside of this forum
                              viss@mastodon.socialV This user is from outside of this forum
                              viss@mastodon.social
                              wrote last edited by
                              #37

                              @FritzAdalis if theres a way to inject a command or run code, yep

                              1 Reply Last reply
                              0
                              • viss@mastodon.socialV viss@mastodon.social

                                #copyfail

                                just to chime in on the copyfail thing, while, yes, it is a very big deal, the prerequisite is that you have a shell on the box you wish to exploit.

                                so keep that in mind when doing risk register stuff.

                                attackers will aim for shit like jumpboxes, shared hosting environments, multi-tennancy environments, and places they can get a shell, then move laterally to get you.

                                shops doing yolo devops are gonna get targeted, and I wouldnt be surprised to see openclaw malicious skills too

                                nyanbinary@infosec.exchangeN This user is from outside of this forum
                                nyanbinary@infosec.exchangeN This user is from outside of this forum
                                nyanbinary@infosec.exchange
                                wrote last edited by
                                #38

                                @Viss yip, thats pretty much the summary I shit out this morning for the folx that will have to talk to management - patch is a must but due to our environments nature this isnt a "all hands on deck" thing, especially as most of the distros we use havent pushed versions yet afaik

                                viss@mastodon.socialV 1 Reply Last reply
                                0
                                • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

                                  @Viss yip, thats pretty much the summary I shit out this morning for the folx that will have to talk to management - patch is a must but due to our environments nature this isnt a "all hands on deck" thing, especially as most of the distros we use havent pushed versions yet afaik

                                  viss@mastodon.socialV This user is from outside of this forum
                                  viss@mastodon.socialV This user is from outside of this forum
                                  viss@mastodon.social
                                  wrote last edited by
                                  #39

                                  @nyanbinary its like our brains are touching again 😄

                                  1 Reply Last reply
                                  0
                                  • R relay@relay.infosec.exchange shared this topic
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups