CVE-2022-24949
Linux openSUSE vulnerability analysis and mitigation

Overview

A privilege escalation vulnerability (CVE-2022-24949) was discovered in Eternal Terminal versions prior to 6.2.0. The vulnerability allows an authenticated attacker to escalate their privileges to root on the target system. The issue was disclosed on October 29, 2021, and was patched in version 6.1.9 (Meta Red Team).

Technical details

The vulnerability stems from a combination of three distinct issues in the PipeSocketHandler::listen() function: a race condition, a buffer overflow, and a logic bug. The logic bug allows sending crafted InitialPayload packets containing a PortForwardSourceRequest with arbitrary SocketEndpoint, leading to arbitrary file deletion through unlink() calls. The race condition exists between bind() and chmod()/chown() calls, allowing file permission and ownership modifications through symlink manipulation. The buffer overflow occurs due to unbounded strcpy() of the name variable into local.sun_path, where the maximum path length is 108 characters (Meta Red Team).

Impact

When successfully exploited, this vulnerability allows an authenticated attacker to gain root privileges on the target system. The attacker can modify critical system files, including /etc/passwd, effectively achieving complete system compromise (Meta Red Team).

Mitigation and workarounds

The vulnerability has been patched in Eternal Terminal version 6.1.9. Users are strongly advised to upgrade to this version or later. The fix includes proper bounds checking, race condition elimination, and logic bug fixes as evidenced in the commit (ET Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management