¡¾Îó²îͨ¸æ¡¿Glibc ld.soȨÏÞÌáÉýÎó²î£¨CVE-2023-4911£©
Ðû²¼Ê±¼ä 2023-10-08Ò»¡¢Îó²î¸ÅÊö
CVE ID | CVE-2023-4911 | ·¢Ã÷ʱ¼ä | 2023-10-07 |
Àà ÐÍ | ȨÏÞÌáÉý | µÈ ¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ÍâµØ | ËùÐèȨÏÞ | µÍ |
¹¥»÷ÖØƯºó | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | ÒѹûÕæ | ÔÚҰʹÓà | δ֪ |
GNU C¿â£¨ÓÖÃûglibc£©£¬ÊÇ GNU ϵͳÒÔ¼°´ó´ó¶¼ÔËÐÐ Linux Äں˵ÄϵͳÖÐµÄ C ¿â¡£
10ÔÂ7ÈÕ£¬ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøVSRC¼à²âµ½glibc µÄ ld.so Öб£´æÒ»¸öÍâµØÌáȨÎó²î£¨CVE-2023-4911£¬±»³ÆΪ¡°Looney Tunables¡±£©£¬ÆäCVSSÆÀ·ÖΪ7.8£¬ÏÖÔÚ¸ÃÎó²îµÄϸ½Ú¼°PoCÒѹûÕæ¡£
glibc ÖÐÒýÈëÁË GLIBC_TUNABLES ÇéÐαäÁ¿£¬Ê¹Óû§Äܹ»ÔÚÔËÐÐʱÐ޸ĿâµÄÐÐΪ£¬¶øÎÞÐèÖØбàÒëÓ¦ÓóÌÐò»ò¿â¡£Í¨¹ýÉèÖà GLIBC_TUNABLES£¬Óû§¿ÉÒÔµ÷½âÖÖÖÖÐÔÄܺÍÐÐΪ²ÎÊý£¬È»ºóÔÚÓ¦ÓóÌÐòÆô¶¯Ê±Ó¦ÓÃÕâЩ²ÎÊý¡£
ÔÚ´¦Öóͷ£ GLIBC_TUNABLES ÇéÐαäÁ¿Ê±£¬GNU C ¿âµÄ¶¯Ì¬¼ÓÔØÆ÷ ld.so Öб£´æ»º³åÇøÒç³öÎó²î£¬ÍâµØµÍȨÏÞÓû§¿ÉÔÚÔËÐоßÓÐSUIDȨÏ޵Ķþ½øÖÆÎļþʱͨ¹ý¶ñÒâÖÆ×÷µÄ GLIBC_TUNABLES ÇéÐαäÁ¿½«È¨ÏÞÌáÉýΪroot¡£
¶þ¡¢Ó°Ïì¹æÄ£
2.34 <= glibc <= 2.38
×¢£º¸ÃÎó²îÒÑÖªÓ°ÏìFedora¡¢Ubuntu ºÍ DebianµÈÖ÷Á÷Linux¿¯Ðа棬°üÀ¨Debian 12 ºÍ 13¡¢Ubuntu 22.04 ºÍ 23.04 ¡¢Fedora 37 ºÍ 38£»Red Hat Enterprise Linux 8¡¢8.6 Extended Update Support¡¢9¡¢9.0 Extended Update Support¡¢Red Hat Virtualization 4 for Red Hat Enterprise Linux 8µÈ¡£±ðµÄ£¬Alpine Linux µÈijЩ¿¯ÐаæÓÉÓÚʹÓà musl libc ¶ø²»ÊÇ glibc Òò¶ø²»ÊܸÃÎó²îÓ°Ïì¡£
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚRed HatÒÑÐû²¼glibc ¸üÐÂÐÞ¸´Á˸ÃÎó²î£¬ÊÜÓ°ÏìÓû§¿É²Î¿¼£º
ÏÂÔØÁ´½Ó£º
https://access.redhat.com/security/cve/CVE-2023-4911
3.2 ÔÝʱ²½·¥
Red Hat Enterprise LinuxÓû§£º
¹ØÓÚÎÞ·¨Á¬Ã¦¸üÐÂÇÒδÆôÓÃÇå¾²Æô¶¯¹¦Ð§µÄÓû§£¬¿ÉÒÔʹÓÃRed HatÌṩµÄ SystemTap ¾ç±¾ºÍ°ì·¨»º½â¸ÃÎó²î£¬ÏêÇé¿É²Î¿¼Red Hat¹Ù·½Í¨¸æ¡£ÆôÓúó£¬ÇéÐÎÖÐʹÓÃGLIBC_TUNABLESŲÓõÄÈκÎsetuid³ÌÐò¶¼½«Á¬Ã¦ÖÕÖ¹¡£ÒªÅ²ÓÃsetuid³ÌÐò£¬Óû§±ØÐè×÷·ÏÉèÖûòɨ³ýGLIBC_TUNABLES envvar£¬ÀýÈç¡°GLIBC_TUNABLES=sudo¡±¡£
DebianÓû§¿É²Î¿¼£º
https://security-tracker.debian.org/tracker/CVE-2023-4911
GentooÓû§¿É²Î¿¼£º
https://security.gentoo.org/glsa/202310-03
Fedora 37¡¢38¡¢39¿É²Î¿¼£º
https://nvd.nist.gov/vuln/detail/CVE-2023-4911
glibcÁ´½Ó£º
https://www.gnu.org/software/libc/
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬ïÔÌϵͳÎó²î£¬ÌáÉý·þÎñÆ÷µÄÇå¾²ÐÔ¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬Ð޸ķÀ»ðǽսÂÔ£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬ïÔ̽«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬ïÔ̹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖƺÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏ޶ȡ£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
https://www.bleepingcomputer.com/news/security/exploits-released-for-linux-flaw-giving-root-on-major-distros/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-10-08 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø¼ò½é
ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø½¨ÉèÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Çå¾²·þÎñ½â¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·Åƶø²»Ð¸Æ𾢡£
5.2 ¹ØÓÚÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø
ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º