Community discussions

MikroTik App
 
bdennie
newbie
Topic Author
Posts: 32
Joined: Thu Aug 05, 2010 4:52 pm

CVE-2016-5195, DirtyCow

Fri Oct 28, 2016 9:00 pm

Is RouterOS susceptible to CVE-2016-5195, DirtyCow?
 
breili
just joined
Posts: 13
Joined: Thu Jan 27, 2011 11:09 am

Re: CVE-2016-5195, DirtyCow

Thu Nov 03, 2016 3:39 pm

I'd be interested in an statement too.

I suspect it is vulnerable but mitigated by no direct access to the proc file system and everything runs as root anyway.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26381
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: CVE-2016-5195, DirtyCow

Thu Nov 03, 2016 3:42 pm

Dirty Cow is a user rights elevation exploit. You install something, and it raises your user to root privileges.

1. RouterOS users are already with root privileges
2. You can't install programs in RouterOS

RouterOS is not affected.
 
breili
just joined
Posts: 13
Joined: Thu Jan 27, 2011 11:09 am

Re: CVE-2016-5195, DirtyCow

Fri Nov 04, 2016 8:38 am

Normis, thank you for the statement. This helps.

If I'm reading this correctly then strictly the statement(s) to use are:
  • * The kernel is vulnerable
    * mitigation 1: no known access path exists to exploit the vulnerability
    * mitigation 2: privilege escalations are not required because all components of RouterOS run as root already
In other words, people who have added unsupported components to RouterOS which don't comply with the two mitigations may find that they affected because the root problem is present.
 
mpreissner
Member
Member
Posts: 357
Joined: Tue Mar 11, 2014 11:16 pm
Location: Columbia, MD

Re: CVE-2016-5195, DirtyCow

Fri Nov 04, 2016 12:35 pm

So think of it like this...the vulnerability is present, but it is irrelevant because everything runs as root. The DirtyCOW vulnerability is used to escalate privileges from a non-root user to root. If nothing runs as a non-root user, then there's really no local accounts that would need to escalate to root. If you've somehow managed to add in unsupported code into the ROS platform, and that code runs as a non-root user, then yes, you effectively will have created an attack vector someone could potentially use. In order for them to exploit the vulnerability, though, they need to be logged in as the non-root user, meaning they already have the credentials, or are able to break into the system in some other way.

Who is online

Users browsing this forum: GoogleOther [Bot], MauriceW and 170 guests