Unsanitized Data Passing in Needrestart Could Allow Local Attack
CVE-2024-11003

7.8HIGH

Key Information:

Vendor
CVE Published:
19 November 2024

Badges

👾 Exploit Exists🟡 Public PoC🟣 EPSS 11%📰 News Worthy

What is CVE-2024-11003?

A vulnerability in the Needrestart tool prior to version 3.8 exposes users to potential command injection attacks. This flaw arises from the improper handling of unsanitized input that is passed to the Modules::ScanDeps library, which is designed to process safe data. A local attacker exploiting this vulnerability could execute arbitrary shell commands, thereby compromising the integrity of the system. For more information, refer to related advisory references and patches.

Affected Version(s)

needrestart Linux 0 < 3.8

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Ubuntu affected by 10-year-old flaws in needrestart package

The five vulnerabilities could lead to local privilege escalation without user interaction.

Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package

Critical Ubuntu needrestart flaws allow local root privilege escalation; update immediately to safeguard systems.

References

EPSS Score

11% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

Credit

Qualys
Thomas Liske
Mark Esler
.