• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new linux bug could lead to user password leaks and

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

You are here: Home / General Cyber Security News / New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking
March 29, 2024

Aspects have emerged about a vulnerability impacting the “wall” command of the util-linux deal that could be possibly exploited by a poor actor to leak a user’s password or alter the clipboard on specified Linux distributions.

The bug, tracked as CVE-2024-28085, has been codenamed WallEscape by security researcher Skyler Ferrante. It has been described as a case of poor neutralization of escape sequences.

“The util-linux wall command does not filter escape sequences from command line arguments,” Ferrante claimed. “This allows unprivileged customers to place arbitrary textual content on other users’ terminals, if mesg is set to “y” and wall is setgid.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The vulnerability was launched as portion of a dedicate built in August 2013.

Cybersecurity

The “wall” command is used to generate a concept to the terminals of all customers that are now logged in to a server, primarily allowing for users with elevated permissions to broadcast key information and facts to all community people (e.g., a method shutdown).

“wall shows a information, or the contents of a file, or if not its typical input, on the terminals of all currently logged in consumers,” the male page for the Linux command reads. “Only the superuser can produce on the terminals of end users who have chosen to deny messages or are making use of a plan which automatically denies messages.”

CVE-2024-28085 effectively exploits improperly filtered escape sequences delivered by way of command line arguments to trick consumers into building a bogus sudo (aka superuser do) prompt on other users’ terminals and trick them into coming into their passwords.

Having said that, for this to perform, the mesg utility – which controls the capacity to display screen messages from other customers – has to be established to “y” (i.e., enabled) and the wall command has to have setgid permissions.

CVE-2024-28085 impacts Ubuntu 22.04 and Debian Bookworm as these two standards are fulfilled. On the other hand, CentOS is not susceptible because the wall command does not have setgid.

“On Ubuntu 22.04, we have sufficient manage to leak a user’s password by default,” Ferrante said. “The only sign of attack to the user will be an incorrect password prompt when they correctly sort their password, alongside with their password remaining in their command record.”

Similarly, on units that allow for wall messages to be despatched, an attacker could perhaps change a user’s clipboard as a result of escape sequences on find terminals like Windows Terminal. It does not work on GNOME Terminal.

Buyers are encouraged to update to util-linux model 2.40 to mitigate against the flaw.

Cybersecurity

“[CVE-2024-28085] makes it possible for unprivileged users to put arbitrary textual content on other end users terminals, if mesg is set to y and *wall is setgid*,” according to the release notes. “Not all distros are influenced (e.g., CentOS, RHEL, Fedora are not Ubuntu and Debian wall is each setgid and mesg is set to y by default).”

The disclosure comes as security researcher notselwyn specific a use-following-cost-free vulnerability in the netfilter subsystem in the Linux kernel that could be exploited to attain community privilege escalation.

Assigned the CVE identifier CVE-2024-1086 (CVSS rating: 7.8), the underlying issue stems from enter sanitization failure of netfilter verdicts, enabling a nearby attacker to lead to a denial-of-services (DoS) ailment or probably execute arbitrary code. It has been addressed in a dedicate pushed on January 24, 2024.

Found this article interesting? Comply with us on Twitter  and LinkedIn to examine extra special written content we publish.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «pypi halts sign ups amid surge of malicious package uploads targeting PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers
Next Post: The Golden Age of Automated Penetration Testing is Here the golden age of automated penetration testing is here»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.