Article Details
Scrape Timestamp (UTC): 2024-01-31 05:45:49.785
Source: https://thehackernews.com/2024/01/new-glibc-flaw-grants-attackers-root.html
Original Article Text
Click to Toggle View
New Glibc Flaw Grants Attackers Root Access on Major Linux Distros. Malicious local attackers can obtain full root access on Linux machines by taking advantage of a newly disclosed security flaw in the GNU C library (aka glibc). Tracked as CVE-2023-6246, the heap-based buffer overflow vulnerability is rooted in glibc's __vsyslog_internal() function, which is used by syslog() and vsyslog() for system logging purposes. It's said to have been accidentally introduced in August 2022 with the release of glibc 2.37. "This flaw allows local privilege escalation, enabling an unprivileged user to gain full root access," Saeed Abbasi, product manager of the Threat Research Unit at Qualys, said, adding it impacts major Linux distributions like Debian, Ubuntu, and Fedora. A threat actor could exploit the flaw to obtain elevated permissions via specially crafted inputs to applications that employ these logging functions. "Although the vulnerability requires specific conditions to be exploited (such as an unusually long argv[0] or openlog() ident argument), its impact is significant due to the widespread use of the affected library," Abbasi noted. The cybersecurity firm said further analysis of glibc unearthed two more flaws in the __vsyslog_internal() function (CVE-2023-6779 and CVE-2023-6780) and a third bug in the library's qsort () function that can lead to memory corruption. The vulnerability found in qsort() has affected all glibc versions released since 1992. The development comes nearly four months after Qualys detailed another high-severity flaw in the same library called Looney Tunables (CVE-2023-4911, CVSS score: 7.8) that could result in privilege escalation. "These flaws highlight the critical need for strict security measures in software development, especially for core libraries widely used across many systems and applications," Abbasi said. Webinar: Decoding the 2024 Customer Data Platform Report Explore the trends, challenges, and opportunities shaping the future of customer data management.
Daily Brief Summary
A newly discovered security flaw in the GNU C library (glibc) allows malicious local users to gain full root access on Linux systems.
The vulnerability, identified as CVE-2023-6246, affects the __vsyslog_internal() function in glibc, a core component of major Linux distributions such as Debian, Ubuntu, and Fedora.
Special conditions are required for exploitation, but the impact is significant due to the universal application of glibc in system logging.
In addition to CVE-2023-6246, researchers also uncovered two related vulnerabilities in the same function and another bug in the glibc qsort() function, which has impacted versions since 1992.
These vulnerabilities underscore the urgency of implementing robust security protocols in the development of fundamental software libraries.
The flaws were disclosed by the Threat Research Unit at Qualys, which emphasizes the importance of continuous security review and updates for software components.