Unsanitized Data Passing in Needrestart Could Allow Local Attack

CVE-2024-11003

7.8HIGH

Key Information

Vendor
Needrestart
Status
Needrestart
Vendor
CVE Published:
19 November 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoCπŸ“° News Worthy

Summary

Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.

Affected Version(s)

needrestart < 3.8

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Ubuntu affected by 10-year-old flaws in needrestart package

The five vulnerabilities could lead to local privilege escalation without user interaction.

1 month ago

Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package

Critical Ubuntu needrestart flaws allow local root privilege escalation; update immediately to safeguard systems.

1 month ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)2 News Article(s)

Credit

Qualys
Thomas Liske
Mark Esler
.