从这个网页截图中,我们可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:CVE-2024-10041 2. 漏洞描述:libpam: Libpam vulnerable to read hashed password 3. 报告日期:2024-10-16 15:23 UTC 4. 报告者:OSIDB Bzimport 5. 状态:NEW 6. 优先级:medium 7. 严重性:medium 8. 目标里程碑:--- 9. 分配给:Product Security DevOps Team 10. 描述: - A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its stdin. In-between, they then train the branch predictor to speculatively execute a ROP chain. - Moreover, when stdin is a pipe or file, the FILE IO buffer malloc'd will receive the just-freed IO buffer that was used to read /etc/shadow, so it is also possible to have the secret conveniently available in the uninitialized memory of the stdin's FILE buf. = 20 - This makes several registers reference the /etc/shadow contents during the read-loop of the fgets call that the polkit agent uses in the pam conversation. = 20 - The attack is difficult to pull off: - Attacker needs to find a gadget chain in the mapped-in executable memory of the victim - Attacker needs to trigger TLB entries to be prefetched to win the race and fit the transient operations in the misspeculation window. - Attacker needs to tweak the attack to break ASLR. This they also can do using Spectre as well. 这些信息可以帮助我们了解漏洞的性质、影响范围以及攻击者可能利用的漏洞进行攻击的方式。