Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Linux Glibc Vulnerability Exposed

January 31, 2024
Reading Time: 3 mins read
in Alerts

Qualys researchers have uncovered a critical local privilege escalation (LPE) vulnerability, tracked as CVE-2023-6246, in the GNU C Library (glibc) affecting multiple major Linux distributions in default configurations. The vulnerability, a heap-based buffer overflow in the __vsyslog_internal() function, is present in glibc versions 2.37 and 2.36. Attackers with unprivileged access can exploit this flaw to gain full root access by manipulating applications that use syslog and vsyslog functions. Debian 12 and 13, Ubuntu 23.04 and 23.10, and Fedora 37 to 39 have been confirmed as vulnerable, emphasizing the widespread impact.

The vulnerability, introduced inadvertently in August 2022 and later backported, poses a significant threat as it allows local privilege escalation. The Qualys researchers noted that while specific conditions are required for exploitation, such as an unusually long argv[0] or openlog() ident argument, the impact is substantial due to the broad use of the affected library. During their testing, the researchers confirmed the vulnerability’s existence in Debian, Ubuntu, and Fedora, and they believe that other distributions are likely exploitable. The findings underscore the critical importance of stringent security measures, particularly for core libraries used extensively across diverse systems and applications.

In addition to CVE-2023-6246, Qualys identified three other vulnerabilities in the glibc, including two in the __vsyslog_internal() function (CVE-2023-6779 and CVE-2023-6780) and a third (awaiting a CVEID) in the glibc’s qsort() function. While the two in __vsyslog_internal() are harder to exploit, they contribute to the overall security risk. The researchers emphasize the need for strict security practices in software development, particularly for core libraries that play a crucial role in diverse systems and applications. Qualys has previously discovered Linux vulnerabilities, such as Looney Tunables, PwnKit, Sequoia, and the Sudo Unix program, highlighting the persistent risks in Linux security.

This discovery adds to the series of Linux vulnerabilities identified by Qualys, showcasing the importance of maintaining robust security measures, especially for widely-used core libraries in Linux distributions. The LPE vulnerability in glibc presents a serious threat, requiring immediate attention and patching to mitigate the risk of unprivileged attackers gaining root access on affected Linux systems. The impact spans major distributions, making it crucial for organizations and Linux users to promptly apply recommended patches and updates to secure their systems against potential exploitation.

Reference:
  • Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog()
Tags: Cyber AlertCyber Alerts 2024Cyber RiskCyber threatglibcJanuary 2024LinuxQualysVulnerabilities
ADVERTISEMENT

Related Posts

Hackers Use Leaked Shellter License Malware

Windows BitLocker Vulnerability Flaw

July 9, 2025
Hackers Use Leaked Shellter License Malware

Hackers Use Leaked Shellter License Malware

July 9, 2025
Hackers Use Leaked Shellter License Malware

Anatsa Android Trojan Targets 90K Users

July 9, 2025
AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025

Latest Alerts

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

Subscribe to our newsletter

    Latest Incidents

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    Norwegian Municipalities Hit by Data Breach

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial