Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Methods


Sep 14, 2023THNEndpoint Safety / Vulnerability

Linux and macOS Systems

A set of reminiscence corruption flaws have been found within the ncurses (brief for new curses) programming library that could possibly be exploited by menace actors to run malicious code on susceptible Linux and macOS methods.

“Utilizing setting variable poisoning, attackers may chain these vulnerabilities to raise privileges and run code within the focused program’s context or carry out different malicious actions,” Microsoft Menace Intelligence researchers Jonathan Bar Or, Emanuele Cozzi, and Michael Pearse mentioned in a technical report revealed at this time.

Cybersecurity

The vulnerabilities, collectively tracked as CVE-2023-29491 (CVSS rating of seven.8), have been addressed as of April 2023. Microsoft mentioned it additionally labored with Apple on addressing the macOS-specific points associated to those flaws.

Surroundings variables are user-defined values that can be utilized by a number of applications on a system and may have an effect on the style through which they behave on the system. Manipulating the variables may cause purposes to carry out in any other case unauthorized operations.

Microsoft’s code auditing and fuzzing discovered that the ncurses library searches for a number of setting variables, together with TERMINFO, which could possibly be poisoned and mixed with the recognized flaws to attain privilege escalation. Terminfo is a database that allows applications to make use of show terminals in a device-independent method.

UPCOMING WEBINAR

Id is the New Endpoint: Mastering SaaS Safety within the Fashionable Age

Dive deep into the way forward for SaaS safety with Maor Bin, CEO of Adaptive Defend. Uncover why identification is the brand new endpoint. Safe your spot now.

Supercharge Your Abilities

The failings embody a stack info leak, a parameterized string kind confusion, an off-by-one error, a heap out-of-bounds throughout terminfo database file parsing, and a denial-of-service with canceled strings.

“The found vulnerabilities may have been exploited by attackers to raise privileges and run code inside a focused program’s context,” the researchers mentioned. “Nonetheless, gaining management of a program via exploiting reminiscence corruption vulnerabilities requires a multi-stage assault.”

“The vulnerabilities could have wanted to be chained collectively for an attacker to raise privileges, reminiscent of exploiting the stack info leak to achieve arbitrary learn primitives together with exploiting the heap overflow to acquire a write primitive.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles