Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-4911 PoC — Glibc: buffer overflow in ld.so leading to privilege escalation

Source
Associated Vulnerability
Title:Glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911)
Description:A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
Readme
# CVE-2023-4911

## 使用

```
docker build -t CVE-2023-4911 -f Dockerfile .
docker run -it CVE-2023-4911
./exp
```

## 参考
- https://github.com/leesh3288/CVE-2023-4911
- https://github.com/Green-Avocado/CVE-2023-4911
- https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
File Snapshot

[4.0K] /data/pocs/4c6e7d32f507554f2e93b30ea0b21660ca798c3d ├── [ 534] Dockerfile ├── [3.7K] exp.c ├── [ 390] gen_libc.py └── [ 331] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →