heroui logo

Potential Dirty Pipe - CVE-2022-0847

Anvilogic Forge

View Source
Summary
The detection rule targets the 'Dirty Pipe' vulnerability, identified as CVE-2022-0847, which is a privilege escalation issue affecting Linux systems. This vulnerability can be exploited by an unprivileged user to gain root-level access, thus posing a significant security risk. The rule necessitates modifications to the Audit daemon (`Auditd`) policies to effectively monitor and log specific system calls related to the exploitation of this vulnerability. The configurations for the `Auditd` policies are detailed and require the definition of a key named 'dirtypipe.' Logging is established for the system calls 'splice' under certain conditions, capturing various parameters to detect suspicious activities. The detection logic uses Splunk to retrieve endpoint data, particularly from Unix systems, and generates a structured output displaying the time of occurrence, host details, user information, and related processes. This alert also includes an association with known threat actors, such as Teal Kurma, providing context and relevance to the monitoring efforts based on intelligence research.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • File
  • Logon Session
ATT&CK Techniques
  • T1068
Created: 2024-02-09