Facebook Twitter Instagram
    Thursday, October 23
    Facebook Twitter Instagram
    SecurNerd
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Vulnerabilities»Linux Flaw CVE-2023-4911 Sparks Frenzy: Exploits Circulating for Root Access on Major Distros
    Vulnerabilities

    Linux Flaw CVE-2023-4911 Sparks Frenzy: Exploits Circulating for Root Access on Major Distros

    securnerdBy securnerdOctober 8, 2023Updated:October 8, 2023No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security experts are on high alert as proof-of-concept exploits emerge online for a critical vulnerability in GNU C Library’s dynamic loader, raising concerns about root access being granted to local attackers on significant Linux distributions.

    Dubbed ‘Looney Tunables’ and officially tracked as CVE-2023-4911, this high-severity flaw stems from a buffer overflow weakness. It has been found to affect default installations of Debian 12 and 13, Ubuntu 22.04 and 23.04, as well as Fedora 37 and 38, posing a significant threat to these widely used Linux platforms.

    The vulnerability enables attackers to exploit a flaw in the GLIBC_TUNABLES environment variable processed by the ld.so dynamic loader. By using a maliciously crafted variable, attackers can execute arbitrary code with root privileges when launching binaries with SUID permission. Several proof-of-concept (PoC) exploits have already been shared by security researchers, including an effective one confirmed by vulnerability expert Will Dormann, released by independent researcher Peter Geissler (blasty).

    Although Geissler’s exploit is limited in scope, he has provided detailed instructions for identifying offsets in each system’s ld.so dynamic loader, allowing for the potential expansion of targets. Concurrently, other researchers are actively developing their CVE-2023-4911 exploits, with some sharing their work on GitHub and similar platforms. While the effectiveness of these exploits has not been fully confirmed, the rapid pace of their development raises concerns within the cybersecurity community.

    Security experts emphasize the urgency for administrators to act swiftly in response to this significant security flaw. The vulnerability provides complete root access on systems running the latest versions of Debian, Ubuntu, and Fedora, making it crucial for affected users to patch their systems promptly. Alpine Linux users remain unaffected by this vulnerability, eliminating the need for immediate action in this specific case.

    Saeed Abbasi, Product Manager at Qualys’ Threat Research Unit, commented on the severity of the situation: “Our successful exploitation, granting full root privileges on major distributions like Fedora, Ubuntu, and Debian, underscores the widespread nature of this vulnerability. While we are withholding our exploit code at this time, the simplicity with which the buffer overflow can be transformed into a data-only attack suggests that other research teams could soon produce and release exploits. This poses a significant risk to countless systems, given the extensive use of glibc across various Linux distributions.”

    Yeah, this works. https://t.co/EQWH04G2eM pic.twitter.com/AY8eWMMIsp

    — Will Dormann (@wdormann) October 5, 2023

    This recent discovery adds to the list of severe Linux security vulnerabilities disclosed by Qualys researchers in recent years, including vulnerabilities in Polkit’s pkexec component (dubbed PwnKit), the Kernel’s filesystem layer (dubbed Sequoia), and the Sudo Unix program (aka Baron Samedit). The Linux community is closely monitoring the situation as security experts work diligently to address the issue and protect users from potential exploitation.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 54
    Trending
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNorth Korea’s Lazarus Group Utilizes Cross-Chain Cryptocurrency Laundering Techniques to Illicitly Gain $900 Million
    Next Article “I Had a Dream” and Generative AI Jailbreaks
    securnerd
    • Website
    • Facebook
    • Twitter
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    AI July 22, 2024

    Complete HTML Handwritten Notes

    July 22, 2024
    AI July 21, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024
    Python June 23, 2024

    PyQt Mastery: From Beginner to Advanced

    June 23, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Join the Community
    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Windows 11’s Microsoft Paint Unveils One-Click Background Eraser

    September 8, 202399 Views

    Massive DDoS attack on U.S. financial company thwarted by cyber firm

    September 10, 202318 Views

    French Agency Targets iPhone 12 for Excessive RF Emissions

    September 13, 202312 Views

    Microsoft Alerts About Phishing Tactics Using Teams Messages to Target Enterprises

    September 19, 202333 Views

    Hackers backdoor telecom providers with new HTTPSnoop malware

    September 20, 202327 Views

    Deceptive WinRAR Exploit Carries VenomRAT Payload

    September 20, 202314 Views

    Ethos Technologies Data Breach $1M Settlement: Claim Up To $5,200 If You Were Affected

    September 21, 202310 Views

    Apple’s Recent Vulnerabilities Exploited to Attack Ex-Egyptian MP using “Predator” Malware

    September 23, 202336 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20234 Views

    “I Had a Dream” and Generative AI Jailbreaks

    October 10, 202334 Views
    Facebook Twitter Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.