• henfredemars@infosec.pub
    link
    fedilink
    English
    arrow-up
    158
    ·
    10 months ago

    For your convenience:

    The researchers pointed out that the vulnerability cannot be exploited remotely. An attacker can trigger the issue by providing crafted inputs to applications that employ these [syslog] logging functions [in apps that allow the user to feed crafted data to those functions].

    This is a privilege escalation.

      • Tja
        link
        fedilink
        arrow-up
        3
        arrow-down
        2
        ·
        10 months ago

        Unless you have user access to a system with gcc on it.

        • Markaos@lemmy.one
          link
          fedilink
          arrow-up
          9
          ·
          10 months ago

          You still need some privileged process to exploit. Glibc code doesn’t get any higher privileges than the rest of the process. From kernel’s point of view, it’s just a part of the program like any other code.

          So if triggering the bug in your own process was enough for privilege escalation, it would also be a critical security vulnerability in the kernel - it can’t allow you to execute a magic sequence of instructions in your process and become a root, that completely destroys any semblance of process / user isolation.