目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2023-4911 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Glibc: buffer overflow in ld.so leading to privilege escalation
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
堆缓冲区溢出
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
glibc 缓冲区错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
glibc(GNU C Library)是GNU计划所实现的C标准库。 glibc存在缓冲区错误漏洞,该漏洞源于动态加载程序ld.so存在缓冲区溢出漏洞。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Red HatRed Hat Enterprise Linux 8 0:2.28-225.el8_8.6 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8 0:2.28-225.el8_8.6 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.6 Extended Update Support 0:2.28-189.6.el8_6 ~ * cpe:/o:redhat:rhel_eus:8.6::baseos
Red HatRed Hat Enterprise Linux 9 0:2.34-60.el9_2.7 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9 0:2.34-60.el9_2.7 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 0:2.34-28.el9_0.4 ~ * cpe:/a:redhat:rhel_eus:9.0::appstream
Red HatRed Hat Virtualization 4 for Red Hat Enterprise Linux 8 0:2.28-189.6.el8_6 ~ * cpe:/o:redhat:rhel_eus:8.6::baseos
Red HatRed Hat Virtualization 4 for Red Hat Enterprise Linux 8 0:4.5.3-10.el8ev ~ * cpe:/o:redhat:rhev_hypervisor:4.4::el8
Red HatRed Hat Virtualization 4 for Red Hat Enterprise Linux 8 0:4.5.3-202312060823_8.6 ~ * cpe:/o:redhat:rhev_hypervisor:4.4::el8
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
二、漏洞 CVE-2023-4911 的公开POC
#POC 描述源链接神龙链接
1https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txthttps://github.com/Green-Avocado/CVE-2023-4911POC详情
2PoC for CVE-2023-4911https://github.com/leesh3288/CVE-2023-4911POC详情
3CVE-2023-4911 proof of concepthttps://github.com/RickdeJager/CVE-2023-4911POC详情
4Nonehttps://github.com/xiaoQ1z/CVE-2023-4911POC详情
5CVE-2023-4911https://github.com/silent6trinity/looney-tuneablesPOC详情
6Nonehttps://github.com/hadrian3689/looney-tunables-CVE-2023-4911POC详情
7CVE-2023-4911https://github.com/ruycr4ft/CVE-2023-4911POC详情
8PoC for CVE-2023-4911 LooneyTuneableshttps://github.com/guffre/CVE-2023-4911POC详情
9Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.https://github.com/chaudharyarjun/LooneyPwnerPOC详情
10Looney Tunables Local privilege escalation (CVE-2023-4911) workshophttps://github.com/KernelKrise/CVE-2023-4911POC详情
11Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit https://github.com/Diego-AltF4/CVE-2023-4911POC详情
12Looney Tunables CVE-2023-4911https://github.com/teraGL/looneyCVEPOC详情
13PoC of CVE-2023-4911https://github.com/snurkeburk/Looney-TunablesPOC详情
14Nonehttps://github.com/puckiestyle/CVE-2023-4911POC详情
15Nonehttps://github.com/yanfernandess/Looney-Tunables-CVE-2023-4911POC详情
16Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables. https://github.com/NishanthAnand21/CVE-2023-4911-PoCPOC详情
17PoC for CVE-2023-4911https://github.com/xem6/CVE-2023-4911POC详情
18CVE-2023-4911-Looney-Tunableshttps://github.com/Billar42/CVE-2023-4911POC详情
19Nonehttps://github.com/dungNHVhust/CVE-2023-4911POC详情
20CVE-2023-4911 exploithttps://github.com/shacojx/CVE-2023-4911-ExploitPOC详情
21Nonehttps://github.com/KillReal01/CVE-2023-4911POC详情
22A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2023/CVE-2023-4911.yamlPOC详情
23Nonehttps://github.com/RRespxwnss/Looney-Tunables-CVE-2023-4911POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2023-4911 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-4911

暂无评论


发表评论