{"id":1181,"date":"2016-01-05T15:58:50","date_gmt":"2016-01-05T13:58:50","guid":{"rendered":"http:\/\/www.identitycosmos.com\/?p=1181"},"modified":"2016-01-05T15:58:50","modified_gmt":"2016-01-05T13:58:50","slug":"grosse-faille-de-scurit-grub2-sur-les-systmes-linux-actuellement-en-production","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2016\/01\/05\/grosse-faille-de-scurit-grub2-sur-les-systmes-linux-actuellement-en-production\/","title":{"rendered":"Grosse faille de s&eacute;curit&eacute; (grub2) sur les syst&egrave;mes Linux actuellement en production !"},"content":{"rendered":"<p>&#160;<\/p>\n<p>Une tr\u00e8s grosse faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 mise en evidence sur les syst\u00e8mes Linux utilisant Grub.<\/p>\n<p>Pour \u00eatre plus pr\u00e9cis il s\u2019agit de la version Grub2 et les versions touch\u00e9es sont comprises entre la version 1.98 et 2.02. Plus d\u2019information sur Grub2 ici: <a title=\"http:\/\/www.linuxpedia.fr\/doku.php\/expert\/grub2\" href=\"http:\/\/www.linuxpedia.fr\/doku.php\/expert\/grub2\">http:\/\/www.linuxpedia.fr\/doku.php\/expert\/grub2<\/a><\/p>\n<p>Grub2 est un boot loader utilis\u00e9 par la majorit\u00e9 des syst\u00e8mes Linux, ce boot loader int\u00e8gre un mode particulier, le mode \u201cgrub rescue\u201d \u2013 Il s\u2019av\u00e8re que ce mode st accessible simplement en executant la marche suivante:<\/p>\n<p>&#8211; d\u00e9marrage de l\u2019OS (pas en mode graphique, en mode tty1)<\/p>\n<p>&#8211; vous arrivez \u00e0 la mire de login<\/p>\n<p>&#8211; vous appuyez 28 fois sur la touche \u201cretour arri\u00e8re\u201d<\/p>\n<p>&#8211; et c\u2019est magique, vous vous retrouvez dans le mode \u201cgrab rescue shell\u201d vous permettant d\u2019avoir un acc\u00e8s sans autentification au syst\u00e8me<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/01\/hack-linux-grub-password.gif\"><img loading=\"lazy\" decoding=\"async\" title=\"hack-linux-grub-password\" style=\"display: inline\" alt=\"hack-linux-grub-password\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/01\/hack-linux-grub-password_thumb.gif\" width=\"450\" height=\"227\" \/><\/a><\/p>\n<p>Les diff\u00e9rentes distributions Linux ont publi\u00e9 un correctif pour cette faille. (voir aussi ici <a title=\"http:\/\/git.savannah.gnu.org\/cgit\/grub.git\/commit\/\" href=\"http:\/\/git.savannah.gnu.org\/cgit\/grub.git\/commit\/\">http:\/\/git.savannah.gnu.org\/cgit\/grub.git\/commit\/<\/a>)<\/p>\n<p>Pour v\u00e9rifier la version de grub2 que vous utilisez, il suffit d\u2019\u00e9x\u00e9cuter (debian\/ubuntu): \u2018grub-install \u2013version\u2019<\/p>\n<p><a href=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/01\/grub2_version.png\"><img loading=\"lazy\" decoding=\"async\" title=\"grub2_version\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; display: inline; padding-right: 0px\" border=\"0\" alt=\"grub2_version\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/01\/grub2_version_thumb.png\" width=\"450\" height=\"145\" \/><\/a><\/p>\n<p>Cette \u201cm\u00e9saventure\u201d nous indique \u00e0 quel point il est important de:<\/p>\n<p>[1] \u2013 Prot\u00e9ger l\u2019acc\u00e8s physique aux machines<\/p>\n<p>[2] \u2013 D\u2019avoir un syst\u00e8me de protection au boot (BIOS password, loader s\u00e9curis\u00e9, etc.)<\/p>\n<p>Plus d\u2019information sur la faille sur ces articles:<\/p>\n<p><a title=\"http:\/\/www.securityweek.com\/password-bypass-flaw-found-grub2-linux-bootloader\" href=\"http:\/\/www.securityweek.com\/password-bypass-flaw-found-grub2-linux-bootloader\">http:\/\/www.securityweek.com\/password-bypass-flaw-found-grub2-linux-bootloader<\/a><\/p>\n<p><a title=\"http:\/\/thehackernews.com\/2015\/12\/hack-linux-grub-password.html\" href=\"http:\/\/thehackernews.com\/2015\/12\/hack-linux-grub-password.html\">http:\/\/thehackernews.com\/2015\/12\/hack-linux-grub-password.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#160;  Une tr\u00e8s grosse faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 mise en evidence sur les syst\u00e8mes Linux utilisant Grub.  Pour \u00eatre plus pr\u00e9cis il s\u2019agit de la version Grub2 et les versions touch\u00e9es sont comprises entre la version 1.98 et 2.02. Plus d\u2019information sur Grub2 ici: http:\/\/www.linuxpedia.fr\/doku.php\/expert\/grub2  Grub2 est un boot loader utilis\u00e9 par la majorit\u00e9 des syst\u00e8mes Linux, ce boot loader int\u00e8gre un mode particulier, le mode \u201cgrub rescue\u201d \u2013 Il s\u2019av\u00e8re que ce mode st accessible simplement en executant la marche suivante:  &#8211; d\u00e9marrage de l\u2019OS (pas en mode graphique, en mode tty1)  &#8211; vous arrivez \u00e0 la mire de login  &#8211; vous appuyez 28 fois sur la touche \u201cretour arri\u00e8re\u201d  &#8211; et c\u2019est magique, vous vous retrouvez dans le mode \u201cgrab rescue shell\u201d vous permettant d\u2019avoir un acc\u00e8s sans autentification au syst\u00e8me    Les diff\u00e9rentes distributions Linux ont publi\u00e9 un correctif pour cette faille. (voir aussi ici http:\/\/git.savannah.gnu.org\/cgit\/grub.git\/commit\/)  Pour v\u00e9rifier la version de grub2 que vous utilisez, il suffit d\u2019\u00e9x\u00e9cuter (debian\/ubuntu): \u2018grub-install \u2013version\u2019    Cette \u201cm\u00e9saventure\u201d nous indique \u00e0 quel point il est important de:  [1] \u2013 Prot\u00e9ger l\u2019acc\u00e8s physique aux machines  [2] \u2013 D\u2019avoir un syst\u00e8me de protection au boot (BIOS password, loader s\u00e9curis\u00e9, etc.)  Plus d\u2019information sur la faille sur ces articles:  http:\/\/www.securityweek.com\/password-bypass-flaw-found-grub2-linux-bootloader  http:\/\/thehackernews.com\/2015\/12\/hack-linux-grub-password.html<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[138,216],"class_list":["post-1181","post","type-post","status-publish","format-standard","hentry","category-technique","tag-linux","tag-securite"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/1181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=1181"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/1181\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=1181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=1181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=1181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}