¡¾Â©¶´Í¨¸æ¡¿Glibc ld.soȨÏÞÌáÉý©¶´£¨CVE-2023-4911£©
Ðû²¼Ê±¼ä 2023-10-08Ò»¡¢Â©¶´¸ÅÊö
CVE ID | CVE-2023-4911 | ·¢ÏÖʱ¼ä | 2023-10-07 |
Àà ÐÍ | ȨÏÞÌáÉý | µÈ ¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | µ±µØ | ËùÐèȨÏÞ | µÍ |
¹¥»÷ÅÓ´ó¶È | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | ÒѹûÈ» | ÔÚÒ°ÀûÓà | δ֪ |
GNU C¿â£¨ÓÖÃûglibc£©£¬ÊÇ GNU ϵͳÒÔ¼°´ó¶àÊýÔËÐÐ Linux Äں˵ÄϵͳÖÐµÄ C ¿â¡£
10ÔÂ7ÈÕ£¬¶«Éƽ̨VSRC¼à²âµ½glibc µÄ ld.so ÖдæÔÚÒ»¸öµ±µØÌáȨ©¶´£¨CVE-2023-4911£¬±»³ÆÎª¡°Looney Tunables¡±£©£¬ÆäCVSSÆÀ·ÖΪ7.8£¬Ä¿Ç°¸Ã©¶´µÄϸ½Ú¼°PoCÒѹûÈ»¡£
glibc ÖÐÒýÈëÁË GLIBC_TUNABLES »·¾³±äÁ¿£¬Ê¹Óû§Äܹ»ÔÚÔËÐÐʱÐ޸ĿâµÄÐÐΪ£¬¶øÎÞÐèÖØÐ±àÒëÓ¦Ó÷¨Ê½»ò¿â¡£Í¨¹ýÉèÖà GLIBC_TUNABLES£¬Óû§¿ÉÒÔµ÷ÕûÖÖÖÖÐÔÄܺÍÐÐΪ²ÎÊý£¬È»ºóÔÚÓ¦Ó÷¨Ê½Æô¶¯Ê±Ó¦ÓÃÕâЩ²ÎÊý¡£
ÔÚ´¦Öà GLIBC_TUNABLES »·¾³±äÁ¿Ê±£¬GNU C ¿âµÄ¶¯Ì¬¼ÓÔØÆ÷ ld.so ÖдæÔÚ»º³åÇøÒç³ö©¶´£¬µ±µØµÍȨÏÞÓû§¿ÉÔÚÔËÐоßÓÐSUIDȨÏ޵Ķþ½øÖÆÎļþʱͨ¹ý¶ñÒâÖÆ×÷µÄ GLIBC_TUNABLES »·¾³±äÁ¿½«È¨ÏÞÌáÉýΪroot¡£
¶þ¡¢Ó°Ï췶Χ
2.34 <= glibc <= 2.38
×¢£º¸Ã©¶´ÒÑÖªÓ°ÏìFedora¡¢Ubuntu ºÍ DebianµÈÖ÷Á÷Linux¿¯Ðа棬°üÂÞDebian 12 ºÍ 13¡¢Ubuntu 22.04 ºÍ 23.04 ¡¢Fedora 37 ºÍ 38£»Red Hat Enterprise Linux 8¡¢8.6 Extended Update Support¡¢9¡¢9.0 Extended Update Support¡¢Red Hat Virtualization 4 for Red Hat Enterprise Linux 8µÈ¡£´ËÍ⣬Alpine Linux µÈijЩ¿¯ÐаæÓÉÓÚʹÓà musl libc ¶ø²»ÊÇ glibc Òò¶ø²»Êܸé¶´Ó°Ïì¡£
Èý¡¢Äþ¾²´ëÊ©
3.1 Éý¼¶°æ±¾
ĿǰRed HatÒÑÐû²¼glibc ¸üÐÂÐÞ¸´Á˸é¶´£¬ÊÜÓ°ÏìÓû§¿É²Î¿¼£º
ÏÂÔØÁ´½Ó£º
https://access.redhat.com/security/cve/CVE-2023-4911
3.2 ÁÙʱ´ëÊ©
Red Hat Enterprise LinuxÓû§£º
¶ÔÓÚÎÞ·¨Á¢¼´¸üÐÂÇÒδÆôÓÃÄþ¾²Æô¶¯¹¦Ð§µÄÓû§£¬¿ÉÒÔʹÓÃRed HatÌṩµÄ SystemTap ½Å±¾ºÍ²½Ö軺½â¸Ã©¶´£¬ÏêÇé¿É²Î¿¼Red Hat¹Ù·½Í¨¸æ¡£ÆôÓú󣬻·¾³ÖÐʹÓÃGLIBC_TUNABLESµ÷ÓõÄÈκÎsetuid·¨Ê½¶¼½«Á¢¼´ÖÕÖ¹¡£Òªµ÷ÓÃsetuid·¨Ê½£¬Óû§±ØÐëÈ¡ÏûÉèÖûòÇå³ýGLIBC_TUNABLES envvar£¬ÀýÈç¡°GLIBC_TUNABLES=sudo¡±¡£
DebianÓû§¿É²Î¿¼£º
https://security-tracker.debian.org/tracker/CVE-2023-4911
GentooÓû§¿É²Î¿¼£º
https://security.gentoo.org/glsa/202310-03
Fedora 37¡¢38¡¢39¿É²Î¿¼£º
https://nvd.nist.gov/vuln/detail/CVE-2023-4911
glibcÁ´½Ó£º
https://www.gnu.org/software/libc/
3.3 ͨÓý¨Òé
l ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£
l ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£
l ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
https://www.bleepingcomputer.com/news/security/exploits-released-for-linux-flaw-giving-root-on-major-distros/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-10-08 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¶«Éƽ̨¼ò½é
¶«Éƽ̨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«Éƽ̨´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬¶«Éƽ̨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£
5.2 ¹ØÓÚ¶«Éƽ̨
¶«Éƽ̨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º