{"id":173250,"date":"2015-01-10T04:51:42","date_gmt":"2015-01-10T09:51:42","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/heads-up-dear-leader-security-hole-found-in-north-koreas-home-grown-os.php"},"modified":"2015-01-10T04:51:42","modified_gmt":"2015-01-10T09:51:42","slug":"heads-up-dear-leader-security-hole-found-in-north-koreas-home-grown-os","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/red-heads\/heads-up-dear-leader-security-hole-found-in-north-koreas-home-grown-os.php","title":{"rendered":"Heads up, dear leader: Security hole found in North Koreas home-grown OS"},"content":{"rendered":"<p><p>    Just a simple change to an unguarded file, and anyone who uses    Red Star OS can get root. Of course, that's a pretty small    population of potential hackers.  <\/p>\n<p>    North Korea is a technological island in many ways. Almost all    of the country's \"Internet\" is run as a private network, with    all connections to the greater global Internet through a    collection of proxies. And the majority of the people of the    Democratic People's Republic of Korea who have access to that    network rely on the country's official operating system: a    Linux variant called Red Star OS.  <\/p>\n<p>    Red Star OS, first introduced in 2003, was originally derived    from Red Hat Linux. In theory, it gave North Korea an improved    level of security against outside attacka Security Enhanced    Linux operating system based on Red Hat that could enforce    strict government access controls on the few who got to use it.  <\/p>\n<p>    However, because Red Star has had so few people with access to    it, one of the ironic side effects has been that security holes    in the operating system may have gone undetected. And as a    security researcher who tested the latest release of Red Star's    desktop version reported today, one flaw in the system would    allow any user to elevate their privileges to those of the    system's root account and bypass all those security policies    put in place by the North Korean regime.  <\/p>\n<p>    Red Star OS Desktop 3.0, which recentlyfound    its way ontotorrents and various download sites as an    .ISO image, is interesting for a number of reasons,    including its attempt to look like Apple's Mac OS X (earlier    versions of Red Star mimicked Windows' user interface).  <\/p>\n<p>    But as an anonymous researcher referring to himself as \"Hacker    Fantastic\" noted in a post today to the Open Source Software    Security (oss-sec) mailing list, it also has one significant    security hole: a mistake made in permissions settings on a key    file that allows anyone with access to the system to run    commands as root. \"Red Star 3.0 desktop ships with a    world-writeable udev rules    '\/etc\/udev\/rules.d\/85-hplj10xx.rules' which can be modified to    include 'RUN+=' arguments executing commands as root by    udev.d,\" the researcher wrote.  <\/p>\n<p>    Udev.d    is a generic kernel device manager that can identify hardware    \"hot-plugged\" into a Linux system. The rules file determines    how to handle the events associated with the connection of a    new device and can include commands to be launched when certain    devices are connectedcommands that are run with system-level    privileges. The \"85-hplj10xx.rules\" file is the ruleset    associated with drivers for a USB-connected Hewlett Packard    LaserJet 1000 series printer and is common to most Linux    distributions.  <\/p>\n<p>    That's probably not a device most North Koreans would typically    hot-plug into their PCs. But because the permissions on that    file are set as \"world writable,\" any user regardless of    permission levels could make changes to the rules to activate    it for any device and execute any command they wanted with    system-level privileges.  <\/p>\n<p>    Ironically, there's a similar file permission error that the    researcher discovered in Red Star OS 2.0's desktop version, in    a different file that's even easier to abusethe system    configuration file for Linux's rc utility, which    manages the operating system's boot-up. That vulnerability    would allow anyone to add commands to be executed during system    boot--a great way to ensure that surveillance software or other    malware loads up persistently.  <\/p>\n<p>    Configuration errors like these in the default installation of    North Korea's official desktop operating system suggest that    there are other security flaws to be found in Red Star. And the    NSA may have already found them.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post: <\/p>\n<p><a target=\"_blank\" href=\"http:\/\/arstechnica.com\/information-technology\/2015\/01\/heads-up-dear-leader-security-hole-found-in-north-koreas-home-grown-os\" title=\"Heads up, dear leader: Security hole found in North Koreas home-grown OS\">Heads up, dear leader: Security hole found in North Koreas home-grown OS<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Just a simple change to an unguarded file, and anyone who uses Red Star OS can get root. Of course, that's a pretty small population of potential hackers. North Korea is a technological island in many ways <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/red-heads\/heads-up-dear-leader-security-hole-found-in-north-koreas-home-grown-os.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[40],"tags":[],"class_list":["post-173250","post","type-post","status-publish","format-standard","hentry","category-red-heads"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/173250"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=173250"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/173250\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=173250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=173250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=173250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}