# Glibc: ld.so中的缓冲区溢出导致特权提升
## 漏洞概述
在GNU C Library的动态加载器`ld.so`处理`GLIBC_TUNABLES`环境变量时发现了缓冲区溢出漏洞。此漏洞可能允许本地攻击者利用恶意构造的`GLIBC_TUNABLES`环境变量,在启动具有SUID权限的二进制文件时,以提升的权限执行代码。
## 影响版本
未提供具体受影响的版本信息。
## 漏洞细节
当GNU C Library的动态加载器`ld.so`处理`GLIBC_TUNABLES`环境变量时可能会发生缓冲区溢出。攻击者可以通过设置恶意构造的`GLIBC_TUNABLES`环境变量,通过启动带有SUID权限的二进制程序,利用此漏洞执行任意代码。
## 影响
本地攻击者可以利用此漏洞以提升的权限执行任意代码,从而控制该系统。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt | https://github.com/Green-Avocado/CVE-2023-4911 | POC详情 |
| 2 | PoC for CVE-2023-4911 | https://github.com/leesh3288/CVE-2023-4911 | POC详情 |
| 3 | CVE-2023-4911 proof of concept | https://github.com/RickdeJager/CVE-2023-4911 | POC详情 |
| 4 | None | https://github.com/xiaoQ1z/CVE-2023-4911 | POC详情 |
| 5 | CVE-2023-4911 | https://github.com/silent6trinity/looney-tuneables | POC详情 |
| 6 | None | https://github.com/hadrian3689/looney-tunables-CVE-2023-4911 | POC详情 |
| 7 | CVE-2023-4911 | https://github.com/ruycr4ft/CVE-2023-4911 | POC详情 |
| 8 | PoC for CVE-2023-4911 LooneyTuneables | https://github.com/guffre/CVE-2023-4911 | POC详情 |
| 9 | Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. | https://github.com/chaudharyarjun/LooneyPwner | POC详情 |
| 10 | Looney Tunables Local privilege escalation (CVE-2023-4911) workshop | https://github.com/KernelKrise/CVE-2023-4911 | POC详情 |
| 11 | Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit | https://github.com/Diego-AltF4/CVE-2023-4911 | POC详情 |
| 12 | Looney Tunables CVE-2023-4911 | https://github.com/teraGL/looneyCVE | POC详情 |
| 13 | PoC of CVE-2023-4911 | https://github.com/snurkeburk/Looney-Tunables | POC详情 |
| 14 | None | https://github.com/puckiestyle/CVE-2023-4911 | POC详情 |
| 15 | None | https://github.com/yanfernandess/Looney-Tunables-CVE-2023-4911 | POC详情 |
| 16 | Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables. | https://github.com/NishanthAnand21/CVE-2023-4911-PoC | POC详情 |
| 17 | PoC for CVE-2023-4911 | https://github.com/xem6/CVE-2023-4911 | POC详情 |
| 18 | CVE-2023-4911-Looney-Tunables | https://github.com/Billar42/CVE-2023-4911 | POC详情 |
| 19 | None | https://github.com/dungNHVhust/CVE-2023-4911 | POC详情 |
| 20 | CVE-2023-4911 exploit | https://github.com/shacojx/CVE-2023-4911-Exploit | POC详情 |
| 21 | None | https://github.com/KillReal01/CVE-2023-4911 | POC详情 |
| 22 | A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2023/CVE-2023-4911.yaml | POC详情 |
| 23 | None | https://github.com/RRespxwnss/Looney-Tunables-CVE-2023-4911 | POC详情 |
标题: oss-security - Re: CVE-2023-4911: Local Privilege Escalation in the glibc's ld.so -- 🔗来源链接
标签:
神龙速读:
### 关键信息总结
- **CVE编号:** CVE-2023-4911
- **漏洞类型:** 本地权限提升
- **影响范围:** glibc 的 ld.so
- **操作系统版本:**
- Fedora 37 和 38
- Ubuntu 22.04 和 23.04
- Debian 12 和 13
- 使用 musl libc 的不包括在内(如 Alpine Linux)
- **漏洞细节:**
- 通过缓冲区溢出漏洞实现权限提升
- 该漏洞可被轻易转化为数据攻击
- **漏洞利用:**
- Qualys 安全顾问已证实利用该漏洞可获得完全 root 权限
- **漏洞利用公开:**
- 不会立即发布漏洞利用代码
- 预计其他研究者会在协调披露后不久发布利用代码
- **相关代码**
- 研究者发布了一些相关代码链接:
- [https://github.com/leesh3288/CVE-2023-4911](https://github.com/leesh3288/CVE-2023-4911)
- [https://github.com/RickdeJager/CVE-2023-4911](https://github.com/RickdeJager/CVE-2023-4911)
标题: oss-security - Re: linux-distros list membership application - CIQ Rocky Linux Security Team -- 🔗来源链接
标签:
神龙速读:
### 关键漏洞信息
- **CVE编号**: CVE-2023-4911
- **相关问题**: glibc安全问题
- **涉及组件**: RHEL(Red Hat Enterprise Linux)安全更新包
### 关键行为
1. **Rocky Linux和CIQ的安全维护**:
- Rocky Linux和CIQ进行及时的RHEL更新重建和发布,以此来维护系统的安全。
2. **安全响应时间**:
- 提到了Rocky Linux/CIQ在处理CVE-2023-4911时,表现出了显著的延迟。例如, Anita Grganji提到他们团队在审查Red Hat的修复包时,注意到一些延迟。
3. **Linux社区安全响应**:
- 邮件中讨论了不同Linux发行版(如Rocky Linux, Almalinux etc.)的社区参与和安全响应机制,包括 lập trình công ty (LTS)对安全更新的支持。
4. **CIQ技术服务**:
- 提到了CIQ为Rocky Linux用户提供企业级支持,包括专门的客户支持和安全SIG存储库。
标题: oss-security - Re: linux-distros list membership application - CIQ Rocky Linux Security Team -- 🔗来源链接
标签:
神龙速读:
从这个网页截图中,关于漏洞的关键信息如下:
- **Subject**: Re: linux-distros list membership application - CIQ Rocky Linux Security Team
- **Date**: Sat, 14 Oct 2023 18:07:44 +0200
- **Key Points**:
- Discussion about whether an "open project or community project" can be represented on (linux-)distros.
- CIQ Rocky Linux Security Team would receive embargoed information for security vulnerabilities.
- Rebuilds and re-releases of RHEL security update packages and security advisories are mentioned as part of the public verifiable track record.
- Links to errata pages for Rocky Linux, examples on updates for security issues.
- **Example Links**:
- https://bugzilla.redhat.com/show_bug.cgi?id=2238352
- https://bugzilla.redhat.com/show_bug.cgi?id=2241966
- https://packages.fedoraproject.org/pkgs/glibc/glibc/fedora-39.html
- https://errata.rockylinux.org
- Examples on forums.rockylinux.org regarding missing errata and updates.
These points suggest a detailed discussion around the participation and representation of CIQ Rocky Linux Security Team within the (linux-)distros community, focusing on security updates and the criteria for membership eligibility.
标题: RHBA-2024:2413 - Bug Fix Advisory - Red Hat Customer Portal -- 🔗来源链接
标签:vendor-advisoryx_refsource_REDHAT
暂无评论