{"id":3340,"date":"2014-03-11T13:15:48","date_gmt":"2014-03-11T17:15:48","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=3340"},"modified":"2020-02-26T15:08:44","modified_gmt":"2020-02-26T15:08:44","slug":"linux-vulnerable-to-apple-cert-bug-sort-of","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/3340\/","title":{"rendered":"Linux Vulnerable to Apple Cert Bug (Sort of)"},"content":{"rendered":"<p>Late on a Friday afternoon in the middle of February, Apple quietly issued a fix for a critical certificate validation bug in iOS that essentially could have given an attacker the ability to spy on supposedly secure communications.<\/p>\n<p>As critical as the bug was and as inconspicuous as a late Friday patch announcement is, this is standard fare for Apple. The Cupertino, California-based computer giant is well known for operating behind a legendary veil of secrecy.<\/p>\n<p>However, heads turned and interests were piqued the following day when it emerged that the bug not only affected Apple\u2019s mobile <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/keyboard-spies-now-on-iphones\/\" target=\"_blank\" rel=\"noopener\">iOS<\/a> operating system <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/critical-ios-macos-bug-can-can-expose-your-confidential-data-update-now\/\" target=\"_blank\" rel=\"noopener\">but its traditional OSX operating system as well<\/a>. The plot thickened further last week when it became apparent that <a href=\"https:\/\/threatpost.com\/gnutls-certificate-verification-flaw-exposes-linux-distros-apps-to-attack\/104614\" target=\"_blank\" rel=\"noopener nofollow\">an eerily similar bug affected GnuTLS<\/a>, a free and open-source piece of software used to implement encryption in various Linux distributions and other platforms.<\/p>\n<p>As more people looked at the bugs (particularly the Apple ones), more news outlets and researchers published suggestions of subterfuge. Bruce Schneier, one of the world\u2019s premiere cryptography and security experts, <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2014\/02\/was_the_ios_ssl.html\" target=\"_blank\" rel=\"noopener nofollow\">described the vulnerability as follows<\/a>:<\/p>\n<p>\u201cThe flaw is subtle, and hard to spot while scanning the code. It\u2019s easy to imagine how this could have happened by error. And it would have been trivially easy for one person to add the vulnerability.<\/p>\n<div class=\"pullquote\">The flaw is subtle, and hard to spot while scanning the code. It\u2019s easy to imagine how this could have happened by error.<\/div>\n<p>\u201cWas this done on purpose? I have no idea. But if I wanted to do something like this on purpose, this is exactly how I would do it.\u201d<\/p>\n<p>Others researchers were more direct, challenging that the coding errors that led to the Apple bug \u2013 dubbed \u201cgoto fail\u201d \u2013 would be nearly impossible to commit and even more difficult to miss in the coding review process. Of course, given the current climate and the utility of the \u2018goto fail\u2019 vulnerability, many have speculated the both the Apple and the GnuTLS bugs would be very valuable to anyone in the business of spying.<\/p>\n<p>While no doubt coincidental and similar in effect, the bugs came to exist in quite different ways. Another crypto expert, <a href=\"https:\/\/threatpost.com\/goto-aside-gnutls-and-apple-bugs-are-not-the-same\/104626\" target=\"_blank\" rel=\"noopener nofollow\">Matthew Green of Johns Hopkins University<\/a>, examined the GnuTLS bug and believes it was an honest \u2013 albeit dumb \u2013 coding mistake.<\/p>\n<p>All conspiracies aside, this crypto-validation failure in GnuTLS means that all Red Hat desktop and server products as well as all Debian and Ubuntu (Linux) installations contain a bug that could be exploited to monitor communications taking place on those machines. This bug impacts affected systems from the bottom to the top. Not only would your secure web-browsing sessions (as indicated by \u2018HTTPS\u2019) be affected, but so too would your applications, downloads, and really any other supposedly encrypted communications that use GnuTLS for implementation.<\/p>\n<p>To be clear, an attacker would need to be on a local network with his or her target in order to exploit any of these bugs. However, under the appropriate circumstances, the bugs could enable an attacker to perform a <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener\">man-in-the-middle<\/a> attack, where the victim believes he or she is communicating with a trusted online service provider but is in fact sending data packets along to an attacker on the network. Both bugs provide a great way to steal login credentials and survey local-network communications.<\/p>\n<p>\u201cThis really is as bad as it gets,\u201d <a href=\"https:\/\/threatpost.com\/gnutls-certificate-verification-flaw-exposes-linux-distros-apps-to-attack\/104614\" target=\"_blank\" rel=\"noopener nofollow\">said Kenneth White, a security expert and principal scientist at Social &amp; Scientific Systems in North Carolina<\/a>. \u201cAn attacker can trivially forge any arbitrary domain and make it appear authoritative and trusted to the requester. So, not only interception of sensitive channels, but [also] potentially subverting the trusted package signature process as well.\u201d<\/p>\n<p>In other words, it\u2019s possible to spoof the sorts of certificate trust information that lets a user know who developed the software or application that user is getting ready to download.<\/p>\n<p>If you run a Linux machine, then you\u2019re probably vulnerable. We recommend installing the most recent update to your Linux distribution as soon as possible. If you don\u2019t run one of the many Linux operating systems available, that doesn\u2019t necessarily mean you\u2019re safe. GnuTLS is a widely deployed, open-source software package running on an unknown number of systems. The moral of the story here, as always, is: install patches early and often.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Late on a Friday afternoon in the middle of February, Apple quietly issued a fix for a critical certificate validation bug in iOS that essentially could have given an attacker<\/p>\n","protected":false},"author":42,"featured_media":3341,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1150,543],"class_list":{"0":"post-3340","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-ios","9":"tag-linux"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/3340\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/3079\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/2980\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/3373\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/4063\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/linux-vulnerable-to-apple-cert-bug-sort-of\/2917\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/4063\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/4063\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3340"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3340\/revisions"}],"predecessor-version":[{"id":18957,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3340\/revisions\/18957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/3341"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}