HomeVulnerabilitylibcue Library Flaw Opens GNOME Linux Programs Susceptible to RCE Attacks

libcue Library Flaw Opens GNOME Linux Programs Susceptible to RCE Attacks

A brand new security flaw has been disclosed within the libcue library impacting GNOME Linux programs that could possibly be exploited to realize distant code execution (RCE) on affected hosts.

Tracked as CVE-2023-43641 (CVSS rating: 8.8), the problem is described as a case of reminiscence corruption in libcue, a library designed for parsing cue sheet recordsdata. It impacts variations 2.2.1 and prior.

libcue is included into Tracker Miners, a search engine device that is included by default in GNOME and indexes recordsdata within the system for simple entry.

The issue is rooted in an out-of-bounds array entry within the track_set_index operate that permits for reaching code execution on the machine just by tricking a sufferer into clicking a malicious hyperlink and downloading a .cue file.

“A consumer of the GNOME desktop setting may be exploited by downloading a cue sheet from a malicious webpage,” in accordance with an outline of the vulnerability within the Nationwide Vulnerability Database (NVD).

“As a result of the file is saved to ‘~/Downloads,’ it’s then routinely scanned by tracker-miners. And since it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to achieve code execution.”

See also  Over 3,000 Openfire servers susceptible to takover assaults

Extra technical details about the vulnerability has been withheld to offer customers sufficient time to put in the most recent updates.

“Generally a vulnerability in a seemingly innocuous library can have a big impression,” GitHub security researcher Kevin Backhouse, who discovered the bug, stated. “As a result of method that it is utilized by tracker-miners, this vulnerability in libcue turned a one-click RCE.”

The disclosure arrives two weeks after GitHub launched complete particulars about CVE-2023-3420, a high-severity kind confusion vulnerability within the Google Chrome V8 JavaScript engine that allows distant code execution (RCE) within the renderer sandbox of the net browser by visiting a malicious web site.

“Vulnerabilities like this are sometimes the place to begin for a ‘one-click’ exploit, which compromise the sufferer’s gadget once they go to a malicious web site,” security researcher Man Yue Mo stated. “A renderer RCE in Chrome permits an attacker to compromise and execute arbitrary code within the Chrome renderer course of.”

See also  Microsoft Patches Delicate Data Disclosure Vulnerability in Azure CLI

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular