GNOME under threat: another Linux vulnerability leaves users with no chance

Carding 4 Carders

Professional
Messages
2,731
Reputation
13
Reaction score
1,367
Points
113
Your data won't be safe until you update your environment to the latest version.

Last week, the Linux community actively discussed the Looney Tunables vulnerability, an exploit for which was released shortly after the public disclosure of the bug.

Now, a new vulnerability related to memory corruption in the open libcue library has been discovered in Linux. It can allow attackers to execute arbitrary code on Linux systems that use the GNOME desktop environment.

Libcue is a library for analyzing CUE files that is integrated into the Tracker Miners file metadata indexer, which is enabled in recent versions of GNOME by default.

GNOME is a popular desktop environment used in various Linux distributions, including Debian, Ubuntu, Fedora, Red Hat Enterprise, and SUSE Linux Enterprise.

Attackers can use this flaw, which is tracked under the identifier CVE-2023-43641, to execute malicious code by using the Tracker Miners automatic indexer to update the search index on devices running the GNOME environment.

"Due to the way it is used in Tracker Miners, this vulnerability in libcue turns into RCE in 1 click. If you are using GNOME, please upgrade today," said Kevin Backhouse, a security researcher at GitHub who discovered the vulnerability, on October 9.

Backhouse demonstrated his PoC exploit in a video, but the public release of this exploit will be postponed to allow time for all GNOME users to update and protect their systems.

Although the exploit needs some tweaking to work properly on every Linux distribution, the researcher said that he has already adapted his creation for the Ubuntu 23.04 and Fedora 38 platforms. According to Backhouse, exploits work there "very reliably."

Although successful exploitation of CVE-2023-43641 requires tricking a potential victim into downloading and activating a malicious CUE file, administrators are advised to fix systems as soon as possible and reduce the risks associated with this security flaw. The vulnerability allows code execution on devices running the latest versions of widely used Linux distributions, including Debian, Fedora, and Ubuntu, and this is not a joke at all.

Be that as it may, it is good that the security solution is already available, and it is available to every user of vulnerable distributions. Update your environment as soon as possible to protect your data.
 
Top