¡¾·ì϶¹«¸æ¡¿Glibc ld.soȨÏÞÌáÉý·ì϶£¨CVE-2023-4911£©
°ä²¼¹¦·ò 2023-10-08Ò»¡¢·ì϶¸ÅÊö
CVE ID | CVE-2023-4911 | ·¢ÏÖ¹¦·ò | 2023-10-07 |
Àà ÐÍ | ȨÏÞÌáÉý | µÈ ¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ±¾µØ | ËùÐèȨÏÞ | µÍ |
¹¥»÷¸´ÔÓ¶È | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | Òѹ«¿ª | ÔÚÒ°ÀûÓà | δ֪ |
GNU C¿â£¨±ðÃûglibc£©£¬ÊÇ GNU ϵͳÒÔ¼°´óÎÞÊýÔËÐÐ Linux Äں˵ÄϵͳÖÐµÄ C ¿â¡£
10ÔÂ7ÈÕ£¬GA»Æ½ð¼×VSRC¼à²âµ½glibc µÄ ld.so ÖдæÔÚÒ»¸ö±¾µØÌáȨ·ì϶£¨CVE-2023-4911£¬±»³ÆÎª¡°Looney Tunables¡±£©£¬ÆäCVSSÆÀ·ÖΪ7.8£¬Ä¿Ç°¸Ã·ì϶µÄϸ½Ú¼°PoCÒѹ«¿ª¡£
glibc ÖÐÒýÈëÁË GLIBC_TUNABLES »·¾³±äÁ¿£¬Ê¹Óû§¿ÉÄÜÔÚÔËÐÐʱÅú¸Ä¿âµÄÐÐΪ£¬¶øÎÞÐè³ÁбàÒëÀûÓ÷¨Ê½»ò¿â¡£Í¨¹ýÉèÖà GLIBC_TUNABLES£¬Óû§Äܹ»µ÷Õû¸÷Àà»úÄܺÍÐÐΪ²ÎÊý£¬¶øºóÔÚÀûÓ÷¨Ê½Æô¶¯Ê±ÀûÓÃÕâЩ²ÎÊý¡£
ÔÚ´¦Öà GLIBC_TUNABLES »·¾³±äÁ¿Ê±£¬GNU C ¿âµÄ¶¯Ì¬¼ÓÔØÆ÷ ld.so ÖдæÔÚ»º³åÇøÒç¶Âí½Å£¬±¾µØµÍȨÏÞÓû§¿ÉÔÚÔËÐÐÓµÓÐSUIDȨÏ޵Ķþ½øÔìÎļþʱͨ¹ý¶ñÒâÔì×÷µÄ GLIBC_TUNABLES »·¾³±äÁ¿½«È¨ÏÞÌáÉýΪroot¡£
¶þ¡¢Ó°ÏìÁìÓò
2.34 <= glibc <= 2.38
×¢£º¸Ã·ì϶ÒÑÖªÓ°ÏìFedora¡¢Ubuntu ºÍ DebianµÈÖ÷Á÷Linux¿¯Ðа棬Ô̺¬Debian 12 ºÍ 13¡¢Ubuntu 22.04 ºÍ 23.04 ¡¢Fedora 37 ºÍ 38£»Red Hat Enterprise Linux 8¡¢8.6 Extended Update Support¡¢9¡¢9.0 Extended Update Support¡¢Red Hat Virtualization 4 for Red Hat Enterprise Linux 8µÈ¡£´Ë±í£¬Alpine Linux µÈijЩ¿¯ÐаæÓÉÓÚʹÓà musl libc ¶ø²»ÊÇ glibc Òò¶ø²»Êܸ÷ì϶ӰÏì¡£
Èý¡¢°²È«´ëÊ©
3.1 Éý¼¶°æ±¾
ĿǰRed HatÒѰ䲼glibc ¸üн¨¸´Á˸÷ì϶£¬ÊÜÓ°ÏìÓû§¿É²Î¿¼£º
ÏÂÔØÁ´½Ó£º
https://access.redhat.com/security/cve/CVE-2023-4911
3.2 һʱ´ëÊ©
Red Hat Enterprise LinuxÓû§£º
¶ÔÓÚÎÞ·¨µ±¼´¸üÐÂÇÒδÆôÓð²È«Æô¶¯Ö°ÄܵÄÓû§£¬Äܹ»Ê¹ÓÃRed HatÌṩµÄ SystemTap ¾ç±¾ºÍ²½Ö軺½â¸Ã·ì϶£¬ÏêÇé¿É²Î¿¼Red Hat¹Ù·½²¼¸æ¡£ÆôÓú󣬻·¾³ÖÐʹÓÃGLIBC_TUNABLESŲÓõÄÈκÎsetuid·¨Ê½¶¼½«µ±¼´ÖÕÖ¹¡£ÒªÅ²ÓÃsetuid·¨Ê½£¬Óû§±ØÐëÈ¡µÞÉèÖûò¶Ï¸ùGLIBC_TUNABLES envvar£¬ÀýÈç¡°GLIBC_TUNABLES=sudo¡±¡£
DebianÓû§¿É²Î¿¼£º
https://security-tracker.debian.org/tracker/CVE-2023-4911
GentooÓû§¿É²Î¿¼£º
https://security.gentoo.org/glsa/202310-03
Fedora 37¡¢38¡¢39¿É²Î¿¼£º
https://nvd.nist.gov/vuln/detail/CVE-2023-4911
glibcÁ´½Ó£º
https://www.gnu.org/software/libc/
3.3 ͨÓý¨Òé
l ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬Ï÷¼õϵͳ·ì϶£¬ÌáÉý·þÎñÆ÷µÄ°²È«ÐÔ¡£
l ¼ÓǿϵͳºÍÍøÂçµÄ½Ó¼û½ÚÔ죬Åú¸Ä·À»ðǽսÊõ£¬¹Ø¹Ø·Ç±ØÒªµÄÀûÓö˿ڻò·þÎñ£¬Ï÷¼õ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Â¶³öµ½¹«Íø£¬Ï÷¼õ¹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶°²È«²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂ簲ȫ»úÄÜ¡£
l ¼ÓǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöà³É·ÖÈÏÖ¤»úÔìºÍ×îÓ×ȨÏÞ×¼Ôò£¬Óû§ºÍÈí¼þȨÏÞӦά³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½Êõ²¢ÉèÖÃΪ¶¨ÆÚÅú¸Ä¡£
3.4 ²Î¿¼Á´½Ó
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
https://www.bleepingcomputer.com/news/security/exploits-released-for-linux-flaw-giving-root-on-major-distros/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-10-08 | ³õ´Î°ä²¼ |
Îå¡¢¸½Â¼
5.1 GA»Æ½ð¼×¼ò½é
GA»Æ½ð¼×³ÉÁ¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢Õ¼ÓÐÆëÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢°²È«¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢°²È«²úÆ·¡¢°²È«·þÎñ½â¾ö¹æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°GA»Æ½ð¼×´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊÓ×¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬Õ¼Óи²¸ÇÈ«¹úµÄÏúÊÛϵͳ¡¢Çþ·ϵͳºÍ¼¼ÊõÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐÓ×°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬GA»Æ½ð¼×ÖÂÁ¦ÓÚÌṩӵÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´Ðµİ²È«²úÆ·ºÍ×î¼Ñʵ¼Ê·þÎñ£¬Ô®ÊÖ¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄ°²È«ÐԺͳö²úЧÁ¦£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢°²È«²úÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸ÖÂÁ¦¡£
5.2 ¹ØÓÚGA»Æ½ð¼×
GA»Æ½ð¼×°²È«Ó¦¼±ÏìÓ¦ÖÐÐÄÒѰ䲼1000¶à¸ö·ì϶¹«¸æÎ¢·çÏÕÔ¤¾¯£¬ÎÒÃǽ«³ÖÐø¸ú×ÙÈ«Çò×îеÄÍøÂ簲ȫÊÂÎñºÍ·ì϶£¬ÎªÆóÒµµÄÐÅÏ¢°²È«±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ