8.8
CVSSv3

CVE-2023-43641

Published: 09/10/2023 Updated: 09/12/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

lipnitsk libcue

fedoraproject fedora 37

fedoraproject fedora 38

fedoraproject fedora 39

debian debian linux 10.0

debian debian linux 11.0

debian debian linux 12.0

Vendor Advisories

Kevin Backhouse discovered an out-of-bounds array access in Libcue, a library for parsing CD metadata, which could result in the execution of arbitrary code For the oldstable distribution (bullseye), this problem has been fixed in version 221-3+deb11u1 For the stable distribution (bookworm), this problem has been fixed in version 221-4+deb12u ...
An out-of-bounds array access has been found in libcue <= 221, leading to arbitrary code execution while parsing a file ...

Github Repositories

RE-learning-resources Resources to learn more about reverse engineering and binary exploitation Contents Tools Disassemblers Programming Other Tools Guides Video Series Courses Other Guides CTF Challenges Papers Sites Heap Exploitation Tools Decompilers Ghidra - developed by the NSA for reverse engineering which is widely used IDA Pro - developed by Hex-Rays used for

Recent Articles

Researcher bags two-for-one deal on Linux bugs while probing GNOME component
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources One-click exploit could potentially affect most major distros

Researchers discovered a high-severity remote code execution (RCE) vulnerability in an inherent component of GNOME-based Linux distros, potentially impacting a huge number of users. Tracked as CVE-2023-43641, exploiting the vulnerability in the relatively small libcue library takes advantage of the tracker-miners application to facilitate a one-click RCE attack. The issue is thought to affect all GNOME-based distros, including RHEL, SUSE, and Debian, but has only been proven to work on the lates...