Article Details

Scrape Timestamp (UTC): 2024-03-29 10:57:33.051

Source: https://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html

Original Article Text

Click to Toggle View

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking. Details have emerged about a vulnerability impacting the "wall" command of the util-linux package that could be potentially exploited by a bad actor to leak a user's password or alter the clipboard on certain Linux distributions. The bug, tracked as CVE-2024-28085, has been codenamed WallEscape by security researcher Skyler Ferrante. It has been described as a case of improper neutralization of escape sequences. "The util-linux wall command does not filter escape sequences from command line arguments," Ferrante said. "This allows unprivileged users to put arbitrary text on other users' terminals, if mesg is set to "y" and wall is setgid." The vulnerability was introduced as part of a commit made in August 2013. The "wall" command is used to write a message to the terminals of all users that are currently logged in to a server, essentially allowing users with elevated permissions to broadcast key information to all local users (e.g., a system shutdown). "wall displays a message, or the contents of a file, or otherwise its standard input, on the terminals of all currently logged in users," the man page for the Linux command reads. "Only the superuser can write on the terminals of users who have chosen to deny messages or are using a program which automatically denies messages." CVE-2024-28085 essentially exploits improperly filtered escape sequences provided via command line arguments to trick users into creating a fake SUDO prompt on other users' terminals and trick them into entering their passwords. However, for this to work, the mesg utility – which controls the ability to display messages from other users – has to be set to "y" (i.e., enabled) and the wall command is executed with setgid permissions. CVE-2024-28085 impacts Ubuntu 22.04 and Debian Bookworm as these two criteria are met. On the other hand, CentOS is not vulnerable since the wall command does not have setgid. "On Ubuntu 22.04, we have enough control to leak a user's password by default," Ferrante said. "The only indication of attack to the user will be an incorrect password prompt when they correctly type their password, along with their password being in their command history." Similarly, on systems that allow wall messages to be sent, an attacker could potentially alter a user's clipboard through escape sequences on select terminals like Windows Terminal. It does not work on GNOME Terminal. Users are advised to update to util-linux version 2.40 to mitigate against the flaw. "[CVE-2024-28085] allows unprivileged users to put arbitrary text on other users terminals, if mesg is set to y and *wall is setgid*," according to the release notes. "Not all distros are affected (e.g., CentOS, RHEL, Fedora are not; Ubuntu and Debian wall is both setgid and mesg is set to y by default)." The disclosure comes as security researcher notselwyn detailed a use-after-free vulnerability in the netfilter subsystem in the Linux kernel that could be exploited to achieve local privilege escalation. Assigned the CVE identifier CVE-2024-1086 (CVSS score: 7.8), the underlying issue stems from input sanitization failure of netfilter verdicts, allowing a local attacker to cause a denial-of-service (DoS) condition or possibly execute arbitrary code. It has been addressed in a commit pushed on January 24, 2024. The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class Internet intelligence from Censys Search.

Daily Brief Summary

CYBERCRIME // Linux Command Vulnerability Risks User Password Theft and Clipboard Manipulation

A new vulnerability, CVE-2024-28085, named WallEscape, affects the Linux "wall" command, risking user password leaks and clipboard hijacking.

The issue arises from improper neutralization of escape sequences in command line arguments, allowing unprivileged users to broadcast arbitrary text to other users' terminals.

Unique conditions in distributions like Ubuntu 22.04 and Debian Bookworm, where the command has setgid permissions and message utility set to "y," make them susceptible.

An attacker could potentially create a fake SUDO prompt to phish for user passwords or manipulate the clipboard on affected systems.

The vulnerability, present since August 2013, is fixed in util-linux version 2.40, and users are urged to update their systems.

Certain Linux distributions, like CentOS, RHEL, and Fedora, are not affected by the CVE-2024-28085 due to different default settings for the wall command.

Another Linux kernel vulnerability, CVE-2024-1086, related to the netfilter subsystem, capable of causing DoS or code execution, has been addressed.

The article also includes references to cloud security strategies and backups for Atlassian Cloud, along with promoting Censys Search for security teams.