Dirty COW
Appearance
![](http://upload.wikimedia.org/wikipedia/commons/thumb/1/1b/DirtyCow.svg/220px-DirtyCow.svg.png)
Dirty COW (Dirty copy-on-write) is a computer security vulnerability for the Linux operating system kernel. It is a local privilege escalation bug that exploits a race condition in the implementation of the copy-on-write mechanism.[1][2] As of October 2016[update], it is actively being exploited.[2]
Although it is a local privilege escalation bug, remote attackers can use it in conjunction with other exploits that allow remote execution of non-privileged code to achieve remote root access on a computer.[1] The attack itself doesn't leave traces in the system log.[2]
It has the CVE designation CVE-2016-5195.[3] The Debian operating system distribution has announced that it has released a patch for the vulnerability.[4]
References
- ^ a b Goodin, Dan (2016-10-20). ""Most serious" Linux privilege-escalation bug ever is under active exploit (updated)". Ars Technica. Retrieved 2016-10-21.
- ^ a b c Vaughan-Nichols, Steven J. "The Dirty Cow Linux bug: A silly name for a serious problem". ZDNet. Retrieved 2016-10-21.
- ^ "Kernel Local Privilege Escalation - CVE-2016-5195 - Red Hat Customer Portal". access.redhat.com. Retrieved 2016-10-21.
- ^ "CVE-2016-5195". security-tracker.debian.org. Retrieved 2016-10-21.
External links