Looney Tunables-A Linux threat from the past that was finally discovered

CarderPlanet

Professional
Messages
2,552
Reaction score
675
Points
83
Hackers will get their own Root access, no matter what the cost.

A vulnerability called "Looney Tunables"was recently discovered in Linux. It allows local attackers to gain superuser rights, exploiting the buffer overflow flaw in the dynamic loader. ld.so GNU C libraries

The GNU C Library (glibc) is the standard C library for the GNU system and is present on most Linux kernel-based systems. It provides the necessary functionality, including system calls such as open, malloc, printf, and exit.

The dynamic loader in glibc is particularly important because it is responsible for preparing and executing programs on Linux systems that use glibc.

The vulnerability was discovered by a team of Qualys Threat Research Unit researchers, and added more than two years ago-in April 2021, with the release of the glibc loader version 2.34, which implemented a fix for the behavior of SXID_ERASE in setuid programs.

Saeed Abbasi, Product manager at Qualys, said: "Our successful exploitation, which resulted in full superuser rights on common distributions such as Fedora, Ubuntu, and Debian, underscores the severity of this vulnerability."

The vulnerability is activated when processing the GLIBC_TUNABLES environment variable on standard installations of Debian 12 and 13, Ubuntu 22.04 and 23.04, and Fedora 37 and 38.

The Red Hat clarified: "A buffer overflow was detected in the dynamic loader ld.so GNU C libraries when processing the environment variable GLIBC_TUNABLES". Low-privilege attackers can exploit this critical vulnerability in low-complexity attacks without user intervention.

Abbasi added, "Given the ability to provide full root access on popular platforms such as Fedora, Ubuntu, and Debian, system administrators should act quickly."

It is worth noting that researchers from Qualys have repeatedly identified critical vulnerabilities that allowed attackers to gain root rights in standard configurations of many Linux distributions.
 
Top