• Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Resources
  • Industry Voice
  • SMB Spotlight
  • Newsletters
  • Resources
    • Inqlogo 120x194
      Inject life into your cloud-hosted applications: 5 best practices to boost end-user experience

      Feel as though the performance of your cloud-hosted applications has become lacklustre? Here are five best practices that can help you boost end-user experiences, simplify performance management, and reduce the cost of your AWS environment. 

      Download
      Inqlogo 120x194
      Your questions answered: How to protect your data in the cloud

      The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • Google+
    • YouTube
  • Newsletter
  • Industry Voice
  • SMB Spotlight
The Inquirer
The Inquirer
  • Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
The Inquirer
  • Security

Linux bug leaves thousands of users vulnerable to attack

Though it seems that it is yet to be exploited

security risk management
  • Chris Merriman
  • Chris Merriman
  • @ChrisTheDJ
  • 05 March 2014
  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
0 Comments

THOUSANDS OF LINUX USERS might be vulnerable to hackers after it emerged that a significant certificate checking bug exists in a low level library.

The problem stems from the GnuTLS library that provides an API to enable SSL, TLS and DTLS encryption protocols, as used particularly by web servers.

However a problem has emerged making it easy for hackers to bypass the encryption, leaving systems exposed and therefore endangering anyone visiting a website that uses GnuTLS, thus leaving website visitors potentially vulnerable to hacking attacks, including keylogging malware that can be used to steal customer credentials.

The problem was discovered by Nikos Mavrogiannopoulos of the Red Hat Security Technologies Team, however it potentially might affect any Linux distribution that uses the GnuTLS library. Red Hat has already issued a patch, which is available through its network.

A bulletin issued by the company explains, "It was discovered that GnuTLS did not correctly handle certain errors that could occur during the verification of an X.509 certificate, causing it to incorrectly report a successful verification.

"An attacker could use this flaw to create a specially crafted certificate that could be accepted by GnuTLS as valid for a site chosen by the attacker."

The bug is similar to the so called "go to fail" problem that affected iOS and OSx machines last year.

At present the scale of the danger is still being assessed, however it has been suggested that anyone running a Linux based system or website should patch their system as a matter of urgency. Details are available at the GnuTLS website. µ

  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Software

INQ Latest

Psssst. Hey kid, you wanna hack the US Air Force?
Psssst. Hey kid, you wanna hack the US Air Force?

Bug Bounty programme wants you to get your Broderick on

  • Security
  • 27 April 2017
Republican-controlled FCC pushes net neutrality takedown
Republican-controlled FCC pushes for net neutrality takedown

It could all fall to bits

  • Infrastructure
  • 27 April 2017
Microsoft took so long to fix a Word flaw that someone blew the bloody doors off it
Microsoft took so long to fix a Word flaw that someone blew the bloody doors off it

You couldn't (be bothered to) make this sort of stuff up

  • Security
  • 27 April 2017
Vodafone is increasing its prices for the second time this year
Vodafone is increasing its prices for the second time this year

Hike will hit out of contract customers in June

  • Communications
  • 27 April 2017
Back to Top

Most read

Psssst. Hey kid, you wanna hack the US Air Force?
Psssst. Hey kid, you wanna hack the US Air Force?
Republican-controlled FCC pushes net neutrality takedown
Republican-controlled FCC pushes for net neutrality takedown
Microsoft took so long to fix a Word flaw that someone blew the bloody doors off it
Microsoft took so long to fix a Word flaw that someone blew the bloody doors off it
Vodafone is increasing its prices for the second time this year
Vodafone is increasing its prices for the second time this year
BlackBerry KeyOne specs, price and release date
BlackBerry KeyOne specs, price and release date
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • Google+
  • YouTube

© Incisive Media Investments Limited 2015

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016