New Linux glibc flaw lets attackers get root on major distros

New Linux glibc flaw lets attackers get root on major distros

January 30, 2024 at 06:11PM

A vulnerability (CVE-2023-6246) in the GNU C Library (glibc) allows unprivileged attackers to gain root access on major Linux distributions. The flaw, introduced in glibc 2.37, leads to local privilege escalation. Qualys confirmed its exploitability on Debian, Ubuntu, and Fedora systems, emphasizing the critical need for strict security measures in core libraries.

Based on the meeting notes, the key takeaways are:

– A local privilege escalation (LPE) vulnerability in the GNU C Library (glibc), tracked as CVE-2023-6246, poses a significant threat to multiple major Linux distributions in their default configurations.

– The vulnerability is due to a heap-based buffer overflow weakness introduced in glibc 2.37 in August 2022 and later backported to glibc 2.36, impacting Debian, Ubuntu, and Fedora systems.

– This vulnerability allows unprivileged users to gain full root access through crafted inputs to applications using the affected library’s logging functions.

– Qualys researchers also identified three other vulnerabilities in glibc, highlighting the critical need for strict security measures in software development.

– The Kinsing gang has been exploiting similar vulnerabilities to deploy cryptocurrency mining malware on compromised cloud-based systems, including Kubernetes, Docker APIs, Redis, and Jenkins servers.

– CISA has ordered U.S. federal agencies to secure their Linux systems against actively exploited bugs, including the CVE-2023-4911 vulnerability.

These takeaways emphasize the critical importance of promptly addressing and mitigating these vulnerabilities to prevent unauthorized access and potential exploitation by threat actors.

Full Article