GNOME Linux System

A new security flaw has been disclosed in the libcue library impacting GNOME Linux systems that could be exploited to achieve remote code execution (RCE) on affected hosts.

Tracked as CVE-2023-43641 (CVSS score: 8.8), the issue is described as a case of memory corruption in libcue, a library designed for parsing cue sheet files. It impacts versions 2.2.1 and prior.

libcue is incorporated into Tracker Miners, a search engine tool that's included by default in GNOME and indexes files in the system for easy access.

Cybersecurity

The problem is rooted in an out-of-bounds array access in the track_set_index function that allows for achieving code execution on the machine simply by tricking a victim into clicking a malicious link and downloading a .cue file.

"A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage," according to a description of the vulnerability in the National Vulnerability Database (NVD).

"Because the file is saved to '~/Downloads,' it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution."

Additional technical information about the vulnerability has been withheld to give users enough time to install the latest updates.

"Sometimes a vulnerability in a seemingly innocuous library can have a large impact," GitHub security researcher Kevin Backhouse, who found the bug, said. "Due to the way that it's used by tracker-miners, this vulnerability in libcue became a one-click RCE."

Cybersecurity

The disclosure arrives two weeks after GitHub released comprehensive details about CVE-2023-3420, a high-severity type confusion vulnerability in the Google Chrome V8 JavaScript engine that enables remote code execution (RCE) in the renderer sandbox of the web browser by visiting a malicious site.

"Vulnerabilities like this are often the starting point for a 'one-click' exploit, which compromise the victim's device when they visit a malicious website," security researcher Man Yue Mo said. "A renderer RCE in Chrome allows an attacker to compromise and execute arbitrary code in the Chrome renderer process."

Update

GitHub, on December 6, 2023, released technical specifics about CVE-2023-43641 along with a proof-of-concept (PoC) exploit for the flaw that can be used to trigger one-click remote code execution on Ubuntu 23.04 and Fedora 38.

"Because tracker-miners uses libcue to automatically scan the downloaded file, it only takes one click on a malicious web page for an attacker to get code execution on your computer," Backhouse said.


Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.