¡¾Â©¶´Í¨¸æ¡¿Glibc ld.soȨÏÞÌáÉý©¶´£¨CVE-2023-4911£©

Ðû²¼Ê±¼ä 2023-10-08

Ò»¡¢Â©¶´¸ÅÊö

CVE   ID

CVE-2023-4911

·¢ÏÖʱ¼ä

2023-10-07

Àà    ÐÍ

ȨÏÞÌáÉý

µÈ    ¼¶

¸ßΣ

¹¥»÷ÏòÁ¿

µ±µØ

ËùÐèȨÏÞ

µÍ

¹¥»÷ÅÓ´ó¶È

µÍ

Óû§½»»¥

ÎÞ

PoC/EXP

ÒѹûÈ»

ÔÚÒ°ÀûÓÃ

δ֪

 

GNU C¿â£¨ÓÖÃûglibc£©£¬ÊÇ GNU ϵͳÒÔ¼°´ó¶àÊýÔËÐÐ Linux Äں˵ÄϵͳÖÐµÄ C ¿â¡£

10ÔÂ7ÈÕ£¬¶«É­Æ½Ì¨VSRC¼à²âµ½glibc µÄ ld.so ÖдæÔÚÒ»¸öµ±µØÌáȨ©¶´£¨CVE-2023-4911£¬±»³ÆÎª¡°Looney Tunables¡±£©£¬ÆäCVSSÆÀ·ÖΪ7.8£¬Ä¿Ç°¸Ã©¶´µÄϸ½Ú¼°PoCÒѹûÈ»¡£

glibc ÖÐÒýÈëÁË GLIBC_TUNABLES »·¾³±äÁ¿£¬Ê¹Óû§Äܹ»ÔÚÔËÐÐʱÐ޸ĿâµÄÐÐΪ£¬¶øÎÞÐèÖØÐ±àÒëÓ¦Ó÷¨Ê½»ò¿â¡£Í¨¹ýÉèÖà GLIBC_TUNABLES£¬Óû§¿ÉÒÔµ÷ÕûÖÖÖÖÐÔÄܺÍÐÐΪ²ÎÊý£¬È»ºóÔÚÓ¦Ó÷¨Ê½Æô¶¯Ê±Ó¦ÓÃÕâЩ²ÎÊý¡£

ÔÚ´¦Öà GLIBC_TUNABLES »·¾³±äÁ¿Ê±£¬GNU C ¿âµÄ¶¯Ì¬¼ÓÔØÆ÷ ld.so ÖдæÔÚ»º³åÇøÒç³ö©¶´£¬µ±µØµÍȨÏÞÓû§¿ÉÔÚÔËÐоßÓÐSUIDȨÏ޵Ķþ½øÖÆÎļþʱͨ¹ý¶ñÒâÖÆ×÷µÄ GLIBC_TUNABLES »·¾³±äÁ¿½«È¨ÏÞÌáÉýΪroot¡£

  

¶þ¡¢Ó°Ï췶Χ

2.34 <= glibc <= 2.38

×¢£º¸Ã©¶´ÒÑÖªÓ°ÏìFedora¡¢Ubuntu ºÍ DebianµÈÖ÷Á÷Linux¿¯Ðаæ£¬°üÂÞDebian 12 ºÍ 13¡¢Ubuntu 22.04 ºÍ 23.04 ¡¢Fedora 37 ºÍ 38£»Red Hat Enterprise Linux 8¡¢8.6 Extended Update Support¡¢9¡¢9.0 Extended Update Support¡¢Red Hat Virtualization 4 for Red Hat Enterprise Linux 8µÈ¡£´ËÍ⣬Alpine Linux µÈijЩ¿¯ÐаæÓÉÓÚʹÓà musl libc ¶ø²»ÊÇ glibc Òò¶ø²»Êܸé¶´Ó°Ïì¡£

 

Èý¡¢Äþ¾²´ëÊ©

3.1 Éý¼¶°æ±¾

ĿǰRed HatÒÑÐû²¼glibc ¸üÐÂÐÞ¸´Á˸é¶´£¬ÊÜÓ°ÏìÓû§¿É²Î¿¼£º

ÏÂÔØÁ´½Ó£º

 https://access.redhat.com/security/cve/CVE-2023-4911

3.2 ÁÙʱ´ëÊ©

Red Hat Enterprise LinuxÓû§£º

¶ÔÓÚÎÞ·¨Á¢¼´¸üÐÂÇÒδÆôÓÃÄþ¾²Æô¶¯¹¦Ð§µÄÓû§£¬¿ÉÒÔʹÓÃRed HatÌṩµÄ SystemTap ½Å±¾ºÍ²½Ö軺½â¸Ã©¶´£¬ÏêÇé¿É²Î¿¼Red Hat¹Ù·½Í¨¸æ¡£ÆôÓú󣬻·¾³ÖÐʹÓÃGLIBC_TUNABLESµ÷ÓõÄÈκÎsetuid·¨Ê½¶¼½«Á¢¼´ÖÕÖ¹¡£Òªµ÷ÓÃsetuid·¨Ê½£¬Óû§±ØÐëÈ¡ÏûÉèÖûòÇå³ýGLIBC_TUNABLES envvar£¬ÀýÈç¡°GLIBC_TUNABLES=sudo¡±¡£

DebianÓû§¿É²Î¿¼£º

https://security-tracker.debian.org/tracker/CVE-2023-4911

GentooÓû§¿É²Î¿¼£º

https://security.gentoo.org/glsa/202310-03

Fedora 37¡¢38¡¢39¿É²Î¿¼£º

https://nvd.nist.gov/vuln/detail/CVE-2023-4911

glibcÁ´½Ó£º

https://www.gnu.org/software/libc/

 

3.3 ͨÓý¨Òé

l  ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£

l  ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£

l  ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£

l  ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£

l  ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£

3.4 ²Î¿¼Á´½Ó

https://bugzilla.redhat.com/show_bug.cgi?id=2238352

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so

https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt

https://www.bleepingcomputer.com/news/security/exploits-released-for-linux-flaw-giving-root-on-major-distros/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-10-08

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ¶«É­Æ½Ì¨¼ò½é

¶«É­Æ½Ì¨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«É­Æ½Ì¨´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬¶«É­Æ½Ì¨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£

5.2 ¹ØÓÚ¶«É­Æ½Ì¨

¶«É­Æ½Ì¨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£

¹Ø×¢ÎÒÃÇ£º

image.png