Difference between revisions of "Vuln kernel priv io"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "= Critical Risk: Privileged Kernel I/O is allowed. = This means that your kernel allows priviliged Input/Output (I/O) operations. ASL includes a special kernel that incl...")

Revision as of 17:31, 10 February 2012

Critical Risk: Privileged Kernel I/O is allowed.

This means that your kernel allows priviliged Input/Output (I/O) operations. ASL includes a special kernel that includes the capability to prevent this.

This means that an attacker can potentially bypass your kernels security safeguards to make changes to the underlining operating system. The ASL kernel restricts this so that the kernel security safeguards can not be bypassed. This prevents an attacker from installing malicious software on the system as a non-root user.

If you see this vulnerability it means:

1) You are not running the ASL kernel

2) You have disabled this protection in the ASL kernel.

Next Steps

First check to see if you are using the ASL kernel by going to this link.

If you are not running the ASL kernel:

Please reboot your system into the ASL kernel.

Note: If you have a VPS system, you will not have your own kernel. Please install ASL on the host server.

If you are running the ASL kernel:

log into the ASL GUI, click on Configuration and select the ASL configuration menu option.  This will open the ASL configuration screen.  Scroll down to DISABLE_PRIVILEGED_IO and set this to "yes" then click update.  You will need to reboot your server for this setting to be implemented on the server.

False Positives

There are no known False Positives for this.

Personal tools