# Glibc: ld.so中的缓冲区溢出导致特权提升
## 漏洞概述
在GNU C Library的动态加载器`ld.so`处理`GLIBC_TUNABLES`环境变量时发现了缓冲区溢出漏洞。此漏洞可能允许本地攻击者利用恶意构造的`GLIBC_TUNABLES`环境变量,在启动具有SUID权限的二进制文件时,以提升的权限执行代码。
## 影响版本
未提供具体受影响的版本信息。
## 漏洞细节
当GNU C Library的动态加载器`ld.so`处理`GLIBC_TUNABLES`环境变量时可能会发生缓冲区溢出。攻击者可以通过设置恶意构造的`GLIBC_TUNABLES`环境变量,通过启动带有SUID权限的二进制程序,利用此漏洞执行任意代码。
## 影响
本地攻击者可以利用此漏洞以提升的权限执行任意代码,从而控制该系统。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt | https://github.com/Green-Avocado/CVE-2023-4911 | POC详情 |
2 | PoC for CVE-2023-4911 | https://github.com/leesh3288/CVE-2023-4911 | POC详情 |
3 | CVE-2023-4911 proof of concept | https://github.com/RickdeJager/CVE-2023-4911 | POC详情 |
4 | None | https://github.com/xiaoQ1z/CVE-2023-4911 | POC详情 |
5 | CVE-2023-4911 | https://github.com/silent6trinity/looney-tuneables | POC详情 |
6 | None | https://github.com/hadrian3689/looney-tunables-CVE-2023-4911 | POC详情 |
7 | CVE-2023-4911 | https://github.com/ruycr4ft/CVE-2023-4911 | POC详情 |
8 | PoC for CVE-2023-4911 LooneyTuneables | https://github.com/guffre/CVE-2023-4911 | POC详情 |
9 | Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. | https://github.com/chaudharyarjun/LooneyPwner | POC详情 |
10 | Looney Tunables Local privilege escalation (CVE-2023-4911) workshop | https://github.com/KernelKrise/CVE-2023-4911 | POC详情 |
11 | Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit | https://github.com/Diego-AltF4/CVE-2023-4911 | POC详情 |
12 | Looney Tunables CVE-2023-4911 | https://github.com/teraGL/looneyCVE | POC详情 |
13 | PoC of CVE-2023-4911 | https://github.com/snurkeburk/Looney-Tunables | POC详情 |
14 | None | https://github.com/puckiestyle/CVE-2023-4911 | POC详情 |
15 | None | https://github.com/yanfernandess/Looney-Tunables-CVE-2023-4911 | POC详情 |
16 | Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables. | https://github.com/NishanthAnand21/CVE-2023-4911-PoC | POC详情 |
17 | PoC for CVE-2023-4911 | https://github.com/xem6/CVE-2023-4911 | POC详情 |
18 | CVE-2023-4911-Looney-Tunables | https://github.com/Billar42/CVE-2023-4911 | POC详情 |
19 | None | https://github.com/dungNHVhust/CVE-2023-4911 | POC详情 |
20 | CVE-2023-4911 exploit | https://github.com/shacojx/CVE-2023-4911-Exploit | POC详情 |
21 | None | https://github.com/KillReal01/CVE-2023-4911 | POC详情 |
22 | A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2023/CVE-2023-4911.yaml | POC详情 |
标题: RHBA-2024:2413 - Bug Fix Advisory - Red Hat Customer Portal -- 🔗来源链接
标签: vendor-advisory x_refsource_REDHAT