CWP panel

Looking into the Looney Tunable Linux Privesc CVE-2023-4911

Looking into the Looney Tunable Linux Privesc CVE-2023-4911

#Looney #Tunable #Linux #Privesc #CVE20234911

“IppSec”

00:00 – Introduction talking about what the Looney Tunable exploit is and my thoughts on the severity of the exploit
02:30 – Start talking about how the vulnerability works
04:00 – The POC String to identify if a box is vulnerable, it doesn’t actually exploit but quickly identifies if a…

source

 

To see the full content, share this page by clicking one of the buttons below

Related Articles

35 Comments

  1. A little mistake I noticed around 7:50; "We use calloc to write"
    Actually we don’t write with calloc, but with the parse_tunable. The program expects the calloc to return nulled memory (which does make sense), but this does not apply here, because an attacker may overflow into this range. So the calloc returns a pointer into our overflow

  2. I tried the method you mentioned, I got ubuntu 22 iso, installed it on my virtualbox while my laptop was disconnected from internet, deleted the unattended-upgrades package then connected to the internet. at first when I ran the command that shows that it's vulnerable it worked, then after a while it gave the su page. Could you tell me what might be the problem?
    Thank you.

  3. I've been following this account since 2018, maybe even 2017 and not once have I seen ipps face. I come to the comments and notta one?! What? I've clearly been living under a rock.

  4. Thanks for your excellent explanation.this exploit is a box killer. I guess this vuln will be patched in no time on HTB. I just love your new format of videos. This one came out at the exact right time for me!

Leave a Reply