Linux Distributions Vulnerable – Glibc Flaw Grants Root Access to Unprivileged Users

by | Jan 31, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A recently discovered local privilege escalation (LPE) vulnerability in the GNU C Library (glibc) is causing alarm in the Linux community, as it opens the door for unprivileged attackers to gain root access on default configurations of several major Linux distributions. Tracked as CVE-2023-6246, this security flaw resides in glibc’s __vsyslog_internal() function, crucially employed by widely-used syslog and vsyslog functions for logging messages to the system message logger.

The critical bug, inadvertently introduced in glibc 2.37 in August 2022 and later backported to glibc 2.36 while addressing a less severe vulnerability (CVE-2022-39046), manifests as a heap-based buffer overflow weakness. The vulnerability allows local privilege escalation, empowering an unprivileged user to attain full root access through manipulated inputs in applications utilizing these logging functions. While certain conditions must be met for exploitation, such as an unusually long argv[0] or specific openlog() ident arguments, the potential impact is substantial due to the widespread use of the affected library.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Affected distributions

Qualys security researchers, in their testing, verified the vulnerability’s existence in Debian 12 and 13, Ubuntu 23.04 and 23.10, and Fedora 37 to 39. In these distributions, unprivileged users could exploit CVE-2023-6246 to elevate their privileges to full root access in default installations. The researchers noted that their tests were limited to a select few distros, suggesting that other distributions may also be exploitable.

The discovery of this vulnerability underscores the critical need for rigorous security measures in software development, particularly for core libraries widely utilized across numerous systems and applications.




Qualys researchers, who have previously uncovered various Linux security vulnerabilities, including those affecting glibc’s ld.so dynamic loader, Polkit’s pkexec component, the Kernel’s filesystem layer, and the Sudo Unix program, emphasize the ongoing challenges in maintaining the security of Linux systems. 

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This