Gain root privileges on Linux 6.3.1 using this vulnerability with this code

by time news

2023-05-10 16:18:00

The Linux kernel is the most important part of the Linux operating system. It is in charge of managing system resources, providing necessary services, and ensuring overall system stability. As a result, any vulnerability within the kernel has the potential to have major implications, which could put the overall security and integrity of the system at risk. The Linux kernel has been discovered to include a major security flaw, which has been assigned the identifier CVE-2023-32233.

This flaw makes it possible for locally authenticated users to gain additional rights while using the system. A locally authenticated attacker can gain elevated root privileges by sending a purpose-built request thanks to the vulnerability, which is caused by a use-after-free hole in Netfilter nf_tables while processing requests in batches. The error was caused by a usage failure after freeing. Linux has a subsystem known as netfilter nf_tables which is responsible for managing the configuration of firewall rules. The problem is that Netfilter nf_tables is accepting some wrong modifications in its configuration which is causing the problem.

Security researchers Piotr Krysiuk and Piotr Krysiuk found the vulnerability and created an attack for it. The exploit makes it possible for local users without administrative privileges to start a root shell when exploiting the problem. This attack was discussed in confidence with Linux kernel security developers so they can get help developing a fix.

An adversary could exploit this vulnerability in a particular situation by constructing a failed batch request that includes actions that lead to a corruption of the internal state of Netfilter nf_tables. Because of this, the attacker is given the ability to gain root access to the system and further elevate their privileges. The main kernel git repository now provides a patch that can be used to resolve the vulnerability that was discovered. System administrators and users are strongly encouraged to implement the patch as quickly as possible to prevent their systems from being exploited.

Various versions of the Linux kernel, including the most recent stable version, Linux 6.3.1, have been used to successfully replicate the issue. If this vulnerability is not fixed, it can be used by hostile actors to gain unauthorized access to the system with elevated privileges. As a result, sensitive data can be compromised and serious outages can occur.


#Gain #root #privileges #Linux #6.3.1 #vulnerability #code

You may also like

Leave a Comment