CVE-2023-4911

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows a local attacker to run their own code with higher privileges on a system by exploiting a flaw in how the system processes certain environment variables. To take advantage of this, the attacker needs to have access to run programs that have SUID permissions, which can give them elevated control over the system.

Technical Description

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,684($1K-$5K)
Vendor Response
Grade FPatched in 864 days

Quick Information

Published

Oct 3, 2023

over 2 years ago

Last Modified

Feb 13, 2026

7 days ago

Vendor

netapp

Product

bootstrap os