¡¾Îó²îͨ¸æ¡¿Glibc ld.soȨÏÞÌáÉýÎó²î£¨CVE-2023-4911£©

Ðû²¼Ê±¼ä 2023-10-08

Ò»¡¢Îó²î¸ÅÊö

CVE   ID

CVE-2023-4911

·¢Ã÷ʱ¼ä

2023-10-07

Àà    ÐÍ

ȨÏÞÌáÉý

µÈ    ¼¶

¸ßΣ

¹¥»÷ÏòÁ¿

ÍâµØ

ËùÐèȨÏÞ

µÍ

¹¥»÷ÖØƯºó

µÍ

Óû§½»»¥

ÎÞ

PoC/EXP

ÒѹûÕæ

ÔÚҰʹÓÃ

δ֪

 

GNU C¿â£¨ÓÖÃûglibc£© £¬ÊÇ GNU ϵͳÒÔ¼°´ó´ó¶¼ÔËÐÐ Linux Äں˵ÄϵͳÖÐµÄ C ¿â¡£

10ÔÂ7ÈÕ £¬ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøVSRC¼à²âµ½glibc µÄ ld.so Öб£´æÒ»¸öÍâµØÌáȨÎó²î£¨CVE-2023-4911 £¬±»³ÆΪ¡°Looney Tunables¡±£© £¬ÆäCVSSÆÀ·ÖΪ7.8 £¬ÏÖÔÚ¸ÃÎó²îµÄϸ½Ú¼°PoCÒѹûÕæ¡£

glibc ÖÐÒýÈëÁË GLIBC_TUNABLES ÇéÐαäÁ¿ £¬Ê¹Óû§Äܹ»ÔÚÔËÐÐʱÐ޸ĿâµÄÐÐΪ £¬¶øÎÞÐèÖØбàÒëÓ¦ÓóÌÐò»ò¿â¡£Í¨¹ýÉèÖà GLIBC_TUNABLES £¬Óû§¿ÉÒÔµ÷½âÖÖÖÖÐÔÄܺÍÐÐΪ²ÎÊý £¬È»ºóÔÚÓ¦ÓóÌÐòÆô¶¯Ê±Ó¦ÓÃÕâЩ²ÎÊý¡£

ÔÚ´¦Öóͷ£ GLIBC_TUNABLES ÇéÐαäÁ¿Ê± £¬GNU C ¿âµÄ¶¯Ì¬¼ÓÔØÆ÷ ld.so Öб£´æ»º³åÇøÒç³öÎó²î £¬ÍâµØµÍȨÏÞÓû§¿ÉÔÚÔËÐоßÓÐSUIDȨÏ޵Ķþ½øÖÆÎļþʱͨ¹ý¶ñÒâÖÆ×÷µÄ GLIBC_TUNABLES ÇéÐαäÁ¿½«È¨ÏÞÌáÉýΪroot¡£

  

¶þ¡¢Ó°Ïì¹æÄ£

2.34 <= glibc <= 2.38

×¢£º¸ÃÎó²îÒÑÖªÓ°ÏìFedora¡¢Ubuntu ºÍ DebianµÈÖ÷Á÷Linux¿¯Ðаæ £¬°üÀ¨Debian 12 ºÍ 13¡¢Ubuntu 22.04 ºÍ 23.04 ¡¢Fedora 37 ºÍ 38£»Red Hat Enterprise Linux 8¡¢8.6 Extended Update Support¡¢9¡¢9.0 Extended Update Support¡¢Red Hat Virtualization 4 for Red Hat Enterprise Linux 8µÈ¡£±ðµÄ £¬Alpine Linux µÈijЩ¿¯ÐаæÓÉÓÚʹÓà musl libc ¶ø²»ÊÇ glibc Òò¶ø²»ÊܸÃÎó²îÓ°Ïì¡£

 

Èý¡¢Çå¾²²½·¥

3.1 Éý¼¶°æ±¾

ÏÖÔÚRed HatÒÑÐû²¼glibc ¸üÐÂÐÞ¸´Á˸ÃÎó²î £¬ÊÜÓ°ÏìÓû§¿É²Î¿¼£º

ÏÂÔØÁ´½Ó£º

 https://access.redhat.com/security/cve/CVE-2023-4911

3.2 ÔÝʱ²½·¥

Red Hat Enterprise LinuxÓû§£º

¹ØÓÚÎÞ·¨Á¬Ã¦¸üÐÂÇÒδÆôÓÃÇå¾²Æô¶¯¹¦Ð§µÄÓû§ £¬¿ÉÒÔʹÓÃRed HatÌṩµÄ SystemTap ¾ç±¾ºÍ°ì·¨»º½â¸ÃÎó²î £¬ÏêÇé¿É²Î¿¼Red Hat¹Ù·½Í¨¸æ¡£ÆôÓúó £¬ÇéÐÎÖÐʹÓÃGLIBC_TUNABLESŲÓõÄÈκÎsetuid³ÌÐò¶¼½«Á¬Ã¦ÖÕÖ¹¡£ÒªÅ²ÓÃsetuid³ÌÐò £¬Óû§±ØÐè×÷·ÏÉèÖûòɨ³ýGLIBC_TUNABLES envvar £¬ÀýÈç¡°GLIBC_TUNABLES=sudo¡±¡£

DebianÓû§¿É²Î¿¼£º

https://security-tracker.debian.org/tracker/CVE-2023-4911

GentooÓû§¿É²Î¿¼£º

https://security.gentoo.org/glsa/202310-03

Fedora 37¡¢38¡¢39¿É²Î¿¼£º

https://nvd.nist.gov/vuln/detail/CVE-2023-4911

glibcÁ´½Ó£º

https://www.gnu.org/software/libc/

 

3.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡ £¬ïÔ̭ϵͳÎó²î £¬ÌáÉý·þÎñÆ÷µÄÇå¾²ÐÔ¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ £¬Ð޸ķÀ»ðǽսÂÔ £¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ £¬ïÔÌ­½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø £¬ïÔÌ­¹¥»÷Ãæ¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ· £¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí £¬ÆôÓöàÒòËØÈÏÖ¤»úÖƺÍ×îСȨÏÞÔ­Ôò £¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏ޶ȡ£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£

3.4 ²Î¿¼Á´½Ó

https://bugzilla.redhat.com/show_bug.cgi?id=2238352

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so

https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt

https://www.bleepingcomputer.com/news/security/exploits-released-for-linux-flaw-giving-root-on-major-distros/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-10-08

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø¼ò½é

ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø½¨ÉèÓÚ1996Äê £¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Çå¾²·þÎñ½â¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø´óÏà £¬¹«Ë¾Ô±¹¤6000ÓàÈË £¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö £¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´ £¬ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ù·þÎñ £¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ £¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·Åƶø²»Ð¸Æ𾢡£

5.2 ¹ØÓÚÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø

ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯ £¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î £¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£

¹Ø×¢ÎÒÃÇ£º

image.png