An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root).
Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613 | Exploit Issue Tracking |
https://snyk.io/blog/abusing-ubuntu-root-privilege-escalation/ | Exploit Third Party Advisory |
https://ubuntu.com/security/notices/USN-6945-1 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2024-08-07 09:16
Updated : 2024-09-17 13:09
NVD link : CVE-2024-5290
Mitre link : CVE-2024-5290
CVE.ORG link : CVE-2024-5290
JSON object : View
Products Affected
w1.fi
- wpa_supplicant
canonical
- ubuntu_linux
CWE
CWE-427
Uncontrolled Search Path Element