A new security flaw has been disclosed in the libcue library impacting GNOME Linux methods that could be exploited to achieve remote code execution (RCE) on influenced hosts.
Tracked as CVE-2023-43641 (CVSS rating: 8.8), the issue is described as a situation of memory corruption in libcue, a library developed for parsing cue sheet files. It impacts versions 2.2.1 and prior.
libcue is incorporated into Tracker Miners, a search engine device that’s involved by default in GNOME and indexes files in the system for easy accessibility.
The dilemma is rooted in an out-of-bounds array access in the keep track of_set_index operate that will allow for accomplishing code execution on the machine simply by tricking a target into clicking a destructive connection and downloading a .cue file.
“A person of the GNOME desktop atmosphere can be exploited by downloading a cue sheet from a destructive webpage,” in accordance to a description of the vulnerability in the Countrywide Vulnerability Database (NVD).
“Mainly because the file is saved to ‘~/Downloads,’ it is then automatically scanned by tracker-miners. And simply because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to attain code execution.”
Extra technical info about the vulnerability has been withheld to give people ample time to install the latest updates.
“Sometimes a vulnerability in a seemingly innocuous library can have a big affect,” GitHub security researcher Kevin Backhouse, who located the bug, explained. “Thanks to the way that it truly is used by tracker-miners, this vulnerability in libcue grew to become a one-click on RCE.”
The disclosure arrives two weeks immediately after GitHub released in depth aspects about CVE-2023-3420, a substantial-severity form confusion vulnerability in the Google Chrome V8 JavaScript engine that enables remote code execution (RCE) in the renderer sandbox of Chrome by traveling to a malicious internet site.
“Vulnerabilities like this are normally the starting off position for a ‘one-click’ exploit, which compromise the victim’s product when they visit a malicious web page,” security researcher Man Yue Mo stated. “A renderer RCE in Chrome will allow an attacker to compromise and execute arbitrary code in the Chrome renderer process.”
Uncovered this post attention-grabbing? Observe us on Twitter and LinkedIn to go through more unique information we write-up.
Some parts of this article are sourced from:
thehackernews.com