← Retour aux CVEs
CVE-2023-4911
HIGHCISA KEV7.8
Description
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
Details CVE
Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie10/3/2023
Derniere modification2/13/2026
Sourcekev
Observations honeypot0
CISA KEV
FournisseurGNU
ProduitGNU C Library
Nom vulnerabiliteGNU C Library Buffer Overflow Vulnerability
Date ajout KEV2023-11-21
Date limite remediation2023-12-12
Utilise dans ransomwareUnknown
Produits affectes
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoragnu:glibcnetapp:bootstrap_osnetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:hci_compute_nodenetapp:ontap_select_deploy_administration_utilityredhat:codeready_linux_builderredhat:codeready_linux_builder_eusredhat:codeready_linux_builder_for_arm64redhat:codeready_linux_builder_for_arm64_eusredhat:codeready_linux_builder_for_ibm_z_systemsredhat:codeready_linux_builder_for_ibm_z_systems_eusredhat:codeready_linux_builder_for_power_little_endianredhat:codeready_linux_builder_for_power_little_endian_eusredhat:enterprise_linuxredhat:enterprise_linux_eusredhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_ibm_z_systems_eus_s390xredhat:enterprise_linux_for_power_big_endian_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat:enterprise_linux_server_tusredhat:enterprise_linux_update_services_for_sap_solutionsredhat:virtualizationredhat:virtualization_host
Faiblesses (CWE)
CWE-122CWE-787
References
https://access.redhat.com/errata/RHSA-2023:5453(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:5454(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:5455(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2023:5476(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0033(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2023-4911(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2238352(secalert@redhat.com)
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt(secalert@redhat.com)
https://www.qualys.com/cve-2023-4911/(secalert@redhat.com)
http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2023/Oct/11(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/10/03/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/10/03/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/10/05/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/10/13/11(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/10/14/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/10/14/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/10/14/6(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:5453(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:5454(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:5455(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2023:5476(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0033(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/CVE-2023-4911(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2238352(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202310-03(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20231013-0006/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5514(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/52479(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualys.com/cve-2023-4911/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-4911(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.