Article Details
Scrape Timestamp (UTC): 2023-10-10 12:05:14.101
Source: https://thehackernews.com/2023/10/libcue-library-flaw-opens-gnome-linux.html
Original Article Text
Click to Toggle View
libcue Library Flaw Opens GNOME Linux Systems Vulnerable to RCE Attacks. A new security flaw has been disclosed in the libcue library impacting GNOME Linux systems that could be exploited to achieve remote code execution (RCE) on affected hosts. Tracked as CVE-2023-43641 (CVSS score: 8.8), the issue is described as a case of memory corruption in libcue, a library designed for parsing cue sheet files. It impacts versions 2.2.1 and prior. libcue is incorporated into Tracker Miners, a search engine tool that's included by default in GNOME and indexes files in the system for easy access. The problem is rooted in an out-of-bounds array access in the track_set_index function that allows for achieving code execution on the machine simply by tricking a victim into clicking a malicious link and downloading a .cue file. "A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage," according to a description of the vulnerability in the National Vulnerability Database (NVD). "Because the file is saved to '~/Downloads,' it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution." Additional technical information about the vulnerability has been withheld to give users enough time to install the latest updates. "Sometimes a vulnerability in a seemingly innocuous library can have a large impact," GitHub security researcher Kevin Backhouse, who found the bug, said. "Due to the way that it's used by tracker-miners, this vulnerability in libcue became a one-click RCE." The disclosure arrives two weeks after GitHub released comprehensive details about CVE-2023-3420, a high-severity type confusion vulnerability in the Google Chrome V8 JavaScript engine that enables remote code execution (RCE) in the renderer sandbox of the web browser by visiting a malicious site. "Vulnerabilities like this are often the starting point for a 'one-click' exploit, which compromise the victim's device when they visit a malicious website," security researcher Man Yue Mo said. "A renderer RCE in Chrome allows an attacker to compromise and execute arbitrary code in the Chrome renderer process."
Daily Brief Summary
A new security flaw in the libcue library affecting GNOME Linux systems could enable cyber criminals to stage remote code execution (RCE) attacks.
The vulnerability, labelled as CVE-2023-43641 and assigned a CVSS score of 8.8, causes memory corruption in libcue, a library for parsing cue sheet files, and affects libcue versions 2.2.1 and prior.
Libcue is integrated into Tracker Miners, a search engine tool included by default in GNOME, which is a commonplace target for hackers.
The flaw is tied to an out-of-bounds array access in the track_set_index function, and allows threat actors to execute code on the victim's machine by tricking the user into downloading a malicious .cue file.
Additional technical information is being held back to allow users time to implement the latest updates.
This alert is issued two weeks after details of the high-risk CVE-2023-3420 vulnerability in the Google Chrome V8 JavaScript engine enabled RCE in the web browser.