• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new glibc flaw grants attackers root access on major linux

New Glibc Flaw Grants Attackers Root Access on Major Linux Distros

You are here: Home / General Cyber Security News / New Glibc Flaw Grants Attackers Root Access on Major Linux Distros
January 31, 2024

Malicious local attackers can acquire complete root entry on Linux machines by using edge of a freshly disclosed security flaw in the GNU C library (aka glibc).

Tracked as CVE-2023-6246, the heap-dependent buffer overflow vulnerability is rooted in glibc’s __vsyslog_inside() operate, which is applied by syslog() and vsyslog() for system logging reasons. It’s reported to have been unintentionally released in August 2022 with the launch of glibc 2.37.

“This flaw makes it possible for neighborhood privilege escalation, enabling an unprivileged consumer to gain entire root obtain,” Saeed Abbasi, product manager of the Menace Study Unit at Qualys, claimed, incorporating it impacts major Linux distributions like Debian, Ubuntu, and Fedora.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

A danger actor could exploit the flaw to get elevated permissions by means of specially crafted inputs to purposes that hire these logging features.

“Although the vulnerability demands unique situations to be exploited (such as an unusually very long argv[0] or openlog() ident argument), its impact is substantial owing to the widespread use of the influenced library,” Abbasi mentioned.

The cybersecurity company reported additional analysis of glibc unearthed two additional flaws in the __vsyslog_inside() purpose (CVE-2023-6779 and CVE-2023-6780) and a third bug in the library’s qsort () functionality that can direct to memory corruption.

The vulnerability identified in qsort() has impacted all glibc variations introduced considering that 1992.

Cybersecurity

The enhancement arrives just about four months just after Qualys detailed a further large-severity flaw in the similar library identified as Looney Tunables (CVE-2023-4911, CVSS rating: 7.8) that could final result in privilege escalation.

“These flaws spotlight the critical will need for strict security steps in computer software enhancement, especially for core libraries widely made use of across several programs and apps,” Abbasi said.

Identified this short article intriguing? Stick to us on Twitter  and LinkedIn to study additional exceptional written content we post.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «brazilian feds dismantle grandoreiro banking trojan, arresting top operatives Brazilian Feds Dismantle Grandoreiro Banking Trojan, Arresting Top Operatives
Next Post: Chinese Hackers Exploiting Critical VPN Flaws to Deploy KrustyLoader Malware chinese hackers exploiting critical vpn flaws to deploy krustyloader malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.