{"id":1527,"date":"2016-11-08T16:23:16","date_gmt":"2016-11-08T16:23:16","guid":{"rendered":"http:\/\/cloudkul.com\/blog\/?p=1527"},"modified":"2017-06-14T11:33:42","modified_gmt":"2017-06-14T11:33:42","slug":"protect-e-commerce-stores-dirty-cow-vulnerability","status":"publish","type":"post","link":"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/","title":{"rendered":"How to protect your E-commerce stores from &#8220;Dirty COW&#8221; vulnerability."},"content":{"rendered":"<p><span style=\"color: #252525;\"><span style=\"font-family: 'Liberation Serif', serif;\"><span style=\"font-size: medium;\">On 21<sup>st<\/sup> October 2016, a new vulnerability named Dirty COW (CVE-2016-5195) which means Dirty copy-on-write is released. It is a computer security vulnerability for the Linux kernels that affects all Linux-based operating systems Debian, RHEL including Android. It is a local privilege escalation vulnerability that exploits race condition in the implementation of the copy-on-write mechanism. The bug has been lurking in the Linux kernel since version 2.6.22 (released in September 2007), and has been actively exploited at least since October 2016. The severity level of this vulnerability is critical that means it is hightly recommended to all of the linux users to update their kernel, with the help of this vulnerability remote attackers can use it in conjunction with other exploits that allow remote execution of non-privileged code to achieve remote root access on a computer and this attack leaves no traces in the system log.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #252525;\"><span style=\"font-size: medium;\"><span style=\"font-family: 'Liberation Serif', serif;\">Now lets talk about how they can affect E-commerce Websites ?<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #252525;\"><span style=\"font-size: medium;\"><span style=\"font-family: 'Liberation Serif', serif;\">Almost 90% of E-commerce stores are running on either LAMP (Apache) or LEMP (NGINX), which make them vulnerable to Dirty COW because all of them are powered by Linux Kernels, even most of the E-commerce frameworks like Magento are giving notification in their admin panel regarding the same.<\/span><\/span><\/span><\/p>\n<p><a href=\"http:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2016\/11\/image.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1528 aligncenter\" src=\"http:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2016\/11\/image.png\" alt=\"image\" width=\"590\" height=\"226\" \/><\/a><\/p>\n<p><em><span style=\"color: #252525;\">Now lets talk about how can we upgrade our linux kernel to get a patch regarding the same vulnerability but here is the catch, you have to reboot your server in response to complete the upgrade on your kernel but if you don&#8217;t want any downtime and maintain the high availability of your e-commerce while patching the\u00a0vulnerability\u00a0on your E-commerce store \u00a0then\u00a0<\/span><\/em><span style=\"font-family: 'Liberation Serif', serif;\"><span style=\"font-size: medium;\"><span style=\"color: #252525;\"><strong><a href=\"http:\/\/cloudkul.com\/contact\/\">CONTACT US<\/a><\/strong><\/span><\/span><\/span><\/p>\n<pre class=\"lang:sh decode:true\">For UBUNTU and DEBIAN based Servers or Systems\r\n\r\nsudo apt-get update &amp;&amp; sudo apt-get dist-upgrade\r\nsudo reboot<\/pre>\n<pre class=\"lang:sh decode:true\">For CentOS based Servers or Systems\r\n\r\nsudo yum update kernel\r\nsudo reboot<\/pre>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 21st October 2016, a new vulnerability named Dirty COW (CVE-2016-5195) which means Dirty copy-on-write <a class=\"text-primary\" title=\"read more\" href=\"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":6,"featured_media":1529,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,87,86,88],"tags":[90,91,89],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to protect your E-commerce stores from &quot;Dirty COW&quot; vulnerability. - Cloudkul<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your E-commerce stores from &quot;Dirty COW&quot; vulnerability. - Cloudkul\" \/>\n<meta property=\"og:description\" content=\"On 21st October 2016, a new vulnerability named Dirty COW (CVE-2016-5195) which means Dirty copy-on-write [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloudkul\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-08T16:23:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-06-14T11:33:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2016\/11\/download-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"848\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nitin Agnihotri\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/\",\"url\":\"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/\",\"name\":\"How to protect your E-commerce stores from \\\"Dirty COW\\\" vulnerability. - Cloudkul\",\"isPartOf\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\"},\"datePublished\":\"2016-11-08T16:23:16+00:00\",\"dateModified\":\"2017-06-14T11:33:42+00:00\",\"author\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/2891deba97a03939d99419a3ac3407a4\"},\"breadcrumb\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloudkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your E-commerce stores from &#8220;Dirty COW&#8221; vulnerability.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\",\"url\":\"https:\/\/cloudkul.com\/blog\/\",\"name\":\"Cloudkul\",\"description\":\"Host your eCommerce Store on AWS with Optimized Performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloudkul.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/2891deba97a03939d99419a3ac3407a4\",\"name\":\"Nitin Agnihotri\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/78eef67ca93349ba049e7db9e3481aa9?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/78eef67ca93349ba049e7db9e3481aa9?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"caption\":\"Nitin Agnihotri\"},\"url\":\"https:\/\/cloudkul.com\/blog\/author\/nitin124\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your E-commerce stores from \"Dirty COW\" vulnerability. - Cloudkul","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"How to protect your E-commerce stores from \"Dirty COW\" vulnerability. - Cloudkul","og_description":"On 21st October 2016, a new vulnerability named Dirty COW (CVE-2016-5195) which means Dirty copy-on-write [...]","og_url":"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/","og_site_name":"Cloudkul","article_published_time":"2016-11-08T16:23:16+00:00","article_modified_time":"2017-06-14T11:33:42+00:00","og_image":[{"width":848,"height":422,"url":"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2016\/11\/download-1.png","type":"image\/png"}],"author":"Nitin Agnihotri","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/","url":"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/","name":"How to protect your E-commerce stores from \"Dirty COW\" vulnerability. - Cloudkul","isPartOf":{"@id":"https:\/\/cloudkul.com\/blog\/#website"},"datePublished":"2016-11-08T16:23:16+00:00","dateModified":"2017-06-14T11:33:42+00:00","author":{"@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/2891deba97a03939d99419a3ac3407a4"},"breadcrumb":{"@id":"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cloudkul.com\/blog\/protect-e-commerce-stores-dirty-cow-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to protect your E-commerce stores from &#8220;Dirty COW&#8221; vulnerability."}]},{"@type":"WebSite","@id":"https:\/\/cloudkul.com\/blog\/#website","url":"https:\/\/cloudkul.com\/blog\/","name":"Cloudkul","description":"Host your eCommerce Store on AWS with Optimized Performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudkul.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/2891deba97a03939d99419a3ac3407a4","name":"Nitin Agnihotri","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/78eef67ca93349ba049e7db9e3481aa9?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78eef67ca93349ba049e7db9e3481aa9?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","caption":"Nitin Agnihotri"},"url":"https:\/\/cloudkul.com\/blog\/author\/nitin124\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/1527"}],"collection":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/comments?post=1527"}],"version-history":[{"count":11,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/1527\/revisions"}],"predecessor-version":[{"id":1541,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/1527\/revisions\/1541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/media\/1529"}],"wp:attachment":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/media?parent=1527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/categories?post=1527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/tags?post=1527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}