CVE-2023-4911

HIGH KEV RANSOMWARE NUCLEI

Glibc Tunables Privilege Escalation CVE-2023-4911 (aka Looney Tunables)

Title source: metasploit

Description

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

Exploits (25)

nomisec WORKING POC 389 stars
by leesh3288 · local
https://github.com/leesh3288/CVE-2023-4911
nomisec WORKING POC 171 stars
by RickdeJager · local
https://github.com/RickdeJager/CVE-2023-4911
nomisec WORKING POC 42 stars
by chaudharyarjun · local
https://github.com/chaudharyarjun/LooneyPwner
nomisec WORKING POC 29 stars
by hadrian3689 · local
https://github.com/hadrian3689/looney-tunables-CVE-2023-4911
github WORKING POC 20 stars
by flex0geek · cpoc
https://github.com/flex0geek/cves-exploits/tree/main/CVE-2023-4911
nomisec WORKING POC 17 stars
by ruycr4ft · local
https://github.com/ruycr4ft/CVE-2023-4911
nomisec WRITEUP 15 stars
by KernelKrise · local
https://github.com/KernelKrise/CVE-2023-4911
nomisec WORKING POC 15 stars
by Green-Avocado · local
https://github.com/Green-Avocado/CVE-2023-4911
nomisec WORKING POC 9 stars
by Diego-AltF4 · local
https://github.com/Diego-AltF4/CVE-2023-4911
nomisec WORKING POC 6 stars
by NishanthAnand21 · local
https://github.com/NishanthAnand21/CVE-2023-4911-PoC
nomisec WORKING POC 2 stars
by puckiestyle · local
https://github.com/puckiestyle/CVE-2023-4911
nomisec WORKING POC 1 stars
by teraGL · local
https://github.com/teraGL/looneyCVE
nomisec WORKING POC 1 stars
by xiaoQ1z · local
https://github.com/xiaoQ1z/CVE-2023-4911
nomisec WORKING POC
by Aryan20057 · poc
https://github.com/Aryan20057/CVE-2023-4911
nomisec WORKING POC
by silent6trinity · local
https://github.com/silent6trinity/looney-tuneables
nomisec WORKING POC
by guffre · local
https://github.com/guffre/CVE-2023-4911
nomisec WORKING POC
by snurkeburk · local
https://github.com/snurkeburk/Looney-Tunables
nomisec WORKING POC
by Billar42 · local
https://github.com/Billar42/CVE-2023-4911
nomisec WORKING POC
by KillReal01 · local
https://github.com/KillReal01/CVE-2023-4911
gitlab WORKING POC
by mdelaclaire · poc
https://gitlab.com/mdelaclaire/LooneyPwner
vulncheck_xdb WORKING POC
local
https://github.com/b4k3d/POC_CVE4911
exploitdb WORKING POC
by Beatriz Fresno Naumova · textlocallinux
https://www.exploit-db.com/exploits/52479
metasploit WORKING POC EXCELLENT
by Qualys Threat Research Unit, blasty <[email protected]>, jheysel-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/glibc_tunables_priv_esc.rb

Nuclei Templates (1)

Looney Tunables Linux - Local Privilege Escalation
HIGHby nybble04

References (27)

... and 7 more

Scores

CVSS v3 7.8
EPSS 0.5953
EPSS Percentile 98.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2023-11-21
VulnCheck KEV 2023-11-03
InTheWild.io 2023-11-03
ENISA EUVD EUVD-2023-54750
Ransomware Use Confirmed

Classification

CWE
CWE-122 CWE-787
Status published

Affected Products (50)

netapp/bootstrap_os
gnu/glibc < 2.39
fedoraproject/fedora
fedoraproject/fedora
fedoraproject/fedora
redhat/codeready_linux_builder
redhat/codeready_linux_builder_eus
redhat/codeready_linux_builder_eus
redhat/codeready_linux_builder_eus
redhat/codeready_linux_builder_eus
redhat/codeready_linux_builder_for_arm64
redhat/codeready_linux_builder_for_arm64_eus
redhat/codeready_linux_builder_for_arm64_eus
redhat/codeready_linux_builder_for_arm64_eus
redhat/codeready_linux_builder_for_arm64_eus
... and 35 more

Timeline

Published Oct 03, 2023
KEV Added Nov 21, 2023
Tracked Since Feb 18, 2026