An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613 | issue tracking exploit |
https://snyk.io/blog/abusing-ubuntu-root-privilege-escalation/ | third party advisory exploit |
https://ubuntu.com/security/notices/USN-6945-1 | vendor advisory |