CVE-2023-4911

Glibc: buffer overflow in ld.so leading to privilege escalation

Basic Information

CVE State
PUBLISHED
Reserved Date
September 12, 2023
Published Date
October 03, 2023
Last Updated
January 28, 2025
Vendor
, Red Hat
Product
, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 8.6 Extended Update Support, Red Hat Enterprise Linux 9, Red Hat Enterprise Linux 9.0 Extended Update Support, Red Hat Virtualization 4 for Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7
Description
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
Tags
linux cisa metasploit_scanner

CVSS Scores

CVSS v3.1

7.8 - HIGH

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
Active
Technical Impact
Total

Exploit Status

Exploited in the Wild
Yes (2023-11-21 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2024-01-19 18:20:05 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-11-21 00:00:00 UTC

Recent Mentions

Siemens SIMATIC S7-1500 CPU Family

Source: All CISA Advisories • Published: 2025-06-12 12:00:00 UTC

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SIMATIC S7-1500 CPU family Vulnerabilities: Missing Encryption of Sensitive Data, Out-of-bounds Read, Use After Free, Stack-based Buffer Overflow, Incorrect Provision of Specified Functionality, Out-of-bounds Write, Incorrect Calculation of Buffer Size, Heap-based Buffer Overflow, External Control of File Name or Path, Uncontrolled Resource Consumption, Improper Input Validation, Truncation of Security-relevant Information, Missing Critical Step in Authentication, Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'), Access of Resource Using Incompatible Type ('Type Confusion'), Signal Handler Race Condition, Inefficient Algorithmic Complexity, Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'), NULL Pointer Dereference, Reachable Assertion, Return of Pointer Value Outside of Expected Range, Improper Handling of Length Parameter Inconsistency, Integer Overflow or Wraparound, Improper Locking, Improper Validation of Array Index, Buffer Underwrite ('Buffer Underflow'), Use of Uninitialized Resource, Detection of Error Condition Without Action, Premature Release of Resource During Expected Lifetime 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to affect the confidentiality, integrity, or availability of affected devices. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Siemens reports that the following products are affected: SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0): V3.1.5 and...

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

glibc_tunables_priv_esc

Type: metasploit • Created: Unknown

Metasploit module for CVE-2023-4911

NishanthAnand21/CVE-2023-4911-PoC

Type: github • Created: 2024-01-20 18:47:07 UTC • Stars: 2

Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables.

yanfernandess/Looney-Tunables-CVE-2023-4911

Type: github • Created: 2024-01-19 18:20:05 UTC • Stars: 2

Diego-AltF4/CVE-2023-4911

Type: github • Created: 2023-10-28 20:05:30 UTC • Stars: 8

Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit

KernelKrise/CVE-2023-4911

Type: github • Created: 2023-10-25 11:59:34 UTC • Stars: 11

Looney Tunables Local privilege escalation (CVE-2023-4911) workshop

ruycr4ft/CVE-2023-4911

Type: github • Created: 2023-10-11 14:49:22 UTC • Stars: 16

CVE-2023-4911

hadrian3689/looney-tunables-CVE-2023-4911

Type: github • Created: 2023-10-10 22:04:23 UTC • Stars: 27

xiaoQ1z/CVE-2023-4911

Type: github • Created: 2023-10-08 03:26:24 UTC • Stars: 1

RickdeJager/CVE-2023-4911

Type: github • Created: 2023-10-04 14:32:49 UTC • Stars: 168

CVE-2023-4911 proof of concept

leesh3288/CVE-2023-4911

Type: github • Created: 2023-10-04 14:12:16 UTC • Stars: 385

PoC for CVE-2023-4911

Green-Avocado/CVE-2023-4911

Type: github • Created: 2023-10-04 11:58:58 UTC • Stars: 14

https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Added to KEVIntel

  • Proof of Concept Exploit Available

  • Detected by Metasploit