TeskaLabs’ Technology SeaCat Unaffected by GNU C Library Security Vulnerability (CVE-2015-7547)

GNU C Library (GLibC) security flaw puts nearly all Linux machines and Linux-based IoT devices at risk

Prague and London - Feb 17, 2016 - TeskaLabs, a Prague and London based startup in application security, today affirmed that their core products are not exposed to the GLibC flaw, a highly critical security vulnerability.

Hackers or cyber criminals have a reason to celebrate today. The recent bug found in the GNU C library, a key component in most Linux distributions, put a large number of Linux-based applications vulnerable to attacks. How soon will hackers exploit this vulnerability? Patch your affected application immediately.

As described in a Google Security blog post, the flaw enables a cyber attacker to gain control over the application by injecting a specially crafted network packet into the application. Since the vulnerable function is commonly used by applications, the impact of this issue is comparable to Heartbleed, a major OpenSSL bug that affected at least 17% of all Internet HTTP servers.

Aside from a large group of Linux-based server applications, there is now a rapidly growing number of IoT devices that use Linux as their operating system and inherently GLibC. These IoT devices are open to exploitation with this mechanism. Attackers can execute their code on any of those devices. They can build large bot networks or steal data from industrial and personal IoT devices. While server-based systems are relatively easy to patch, IoT devices lack such feature and patching this flaw is hard or even impossible.

We have millions of exploitable IoT devices scattered around the world. And they will be exploited. This type of attack can and will be automated.

Unlike unprotected applications that use GLibC, SeaCat-enabled applications (IoT or mobile) are unaffected because they do not use the function called getaddrinfo() from GLibC component libresolv. Instead, they use their own implementation of this function which is a part of the SeaCat SDK.

“Buffer overflow type of attacks stemmed from this GLibC vulnerability is a serious issue,” said Jiri Kohout, TeskaLabs VP of Application Security. “GNU C Library is widely used, and it is difficult to know all the applications that are affected. Moreover, the situation is becoming more urgent because there are code that people can download and execute to exploit this vulnerability. If you can not immediately update this library, limit TCP DNS replies to 1024 bytes and drop UDP DNS packets bigger than 512 bytes.”

The anatomy of an attack

buffer overflow glibc

Comparison between unprotected app and app secured by SeaCat

app protected by SeaCat against glibc

SeaCat is the core technology behind SeaCat Mobile Secure Gateway and IoT/M2M Application Security Platform, which protect mobile, IoT/M2M applications, the communication channel and application backends.

If your application is SeaCat-enabled, you are immune from this vulnerability, and you don’t need to take any action. If you are unsure, please contact us immediately.

About TeskaLabs

TeskaLabs, a mobile and IoT application security provider, help enterprises build and operate their Mobile and IoT applications safely. TeskaLabs’ application security platform offers an active, up-to-date security protection via software, hardware, and cloud based products. Our technology is simple for application developers to implement, provides visibility to information security officers and saves time for IT Admins. For more information, visit https://www.teskalabs.com and follow @TeskaLabs on Twitter.

###

Media contact:

Vladimira Teskova

Mobile: +44 (0) 7548 674986 (UK)

Email: vladimira.teskova@teskalabs.com




You Might Be Interested in Reading These Articles

TeskaLabs Secures €337 K in Pre-Seed Funding

TeskaLabs, a hi-tech security startup founded in Prague, with operations in London, announced today, exclusively through Forbes.cz, that it has secured €337,000 (CZK 9.1 million) in a pre-seed funding round, from a mix of private and institutional investors. TeskaLabs, which produces cutting edge enterprise-grade security for mobile and Internet of Things (IoT) applications, is backed by noted tech accelerators StartupYard Prague and Techstars London, and Credo Ventures, a European venture capital firm.

Continue reading ...

press

Published on August 19, 2015

Business mission to the Netherlands

At the beginning of March, the founders of the TeskaLabs, Aleš Teska (CEO) and Vladimíra Tesková (COO), participated in a business mission to the Netherlands, the topic of which was cybersecurity. The agenda included meetings with representatives of companies, educational and research organizations, discussions and sharing of experience in the fight against cybercrime or a look behind the scenes of top Dutch government and private institutions.

Continue reading ...

press

Published on March 15, 2023

The 8th version of the European Certificate Trust List (ECTL) for C-ITS has been released

The Joint Research Centre of the European Commision (EC JRC) released the eight edition of the European Certificate Trust List (ECTL) used in Cooperative Intelligent Transport Systems (C-ITS). L0 ECTL v8 contains five new Root CA certificates and one re-keyed Root CA certificate. Three out of five newly inserted Root Certificates are installations that run on the TeskaLabs SeaCat PKI software for C-ITS.

Continue reading ...

press automotive c-its v2x security

Published on September 16, 2021