Feb 18 2022

CVE-2021-44731 Linux privilege escalation bug affects Canonical’s Snap Package Manager

Category: Linux SecurityDISC @ 10:39 am

Canonical’s Snap software packaging and deployment system are affected by multiple vulnerabilities, including a privilege escalation flaw tracked as 

 (CVSS score 7.8).

Snap is a software packaging and deployment system developed by Canonical for operating systems that use the Linux kernel. The packages, called snaps, and the tool for using them, snapd, work across a range of Linux distributions

The flaws have been discovered by Qualys researchers, the CVE-2021-44731 is the most severe one and is a race condition in the snap-confine’s setup_private_mount() function.

The snap-confine is a program used internally by snapd to construct the execution environment for snap applications. An unprivileged user can trigger the flaw to gain root privileges on the affected host.

“Successful exploitation of this vulnerability allows any unprivileged user to gain root privileges on the vulnerable host.” reads the post published by the experts. “As soon as the Qualys Research Team confirmed the vulnerability, we engaged in responsible vulnerability disclosure and coordinated with both vendor and open-source distributions in announcing this newly discovered vulnerability.”

Qualys experts also developed a PoC exploit for this issue that allows obtaining full root privileges on default Ubuntu installations.

Below is the full list of vulnerabilities discovered by the experts:

CVEDESCRIPTION
CVE-2021-44731Race condition in snap-confine’s setup_private_mount()
CVE-2021-44730Hardlink attack in snap-confine’s sc_open_snapd_tool()
CVE-2021-3996Unauthorized unmount in util-linux’s libmount
CVE-2021-3995Unauthorized unmount in util-linux’s libmount
CVE-2021-3998Unexpected return value from glibc’s realpath()
CVE-2021-3999Off-by-one buffer overflow/underflow in glibc’s getcwd()
CVE-2021-3997Uncontrolled recursion in systemd’s systemd-tmpfiles

Tags: Privilege Escalation


Aug 26 2021

Interesting Privilege Escalation Vulnerability

Category: Security vulnerabilities,Windows SecurityDISC @ 9:21 am

It should be noted that this is a local privilege escalation (LPE) vulnerability, which means that you need to have a Razer devices and physical access to a computer. With that said, the bug is so easy to exploit as you just need to spend $20 on Amazon for Razer mouse and plug it into Windows 10 to become an admin.

Privileged Attack Vectors

Razer DeathAdder Essential Gaming Mouse

Tags: Privilege Escalation, vulnerabilities, Windows, zero-day