Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 months agoCritical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwidecybersecuritynews.comexternal-linkmessage-square5fedilinkarrow-up125arrow-down14
arrow-up121arrow-down1external-linkCritical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwidecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 months agomessage-square5fedilink
minus-squareSayCyberOnceMore@feddit.uklinkfedilinkEnglisharrow-up8·4 months agoSkimming through the Qualsys report it seems that the attacker would already need access to the device first, to be able to crash the processes and then collect the hashes, so I’d say this vulnerability appears to need chaining with other(s)?
Skimming through the Qualsys report it seems that the attacker would already need access to the device first, to be able to crash the processes and then collect the hashes, so I’d say this vulnerability appears to need chaining with other(s)?