socradar.io Open in urlscan Pro
2606:4700:3108::ac42:2bbb  Public Scan

URL: https://socradar.io/privilege-escalation-risks-in-needrestart-utility-threaten-linux-systems-oss-fuzz-finds-26-hidde...
Submission: On December 05 via api from IN — Scanned from US

Form analysis 3 forms found in the DOM

GET https://socradar.io/labs/dark-web-report/search

<form target="_blank" action="https://socradar.io/labs/dark-web-report/search" method="GET" data-hs-cf-bound="true">
  <div class="form-wrapper relative grid gap-[30px]">
    <div class="form-el group/form">
      <input name="domain" type="text" placeholder="Type your domain or email address" required=""
        class="pr-[80px] w-full h-[62px] rounded-[5px] bg-transparent outline-none px-[20px] sm:px-[20px] text-[16px] leading-normal text-santas-gray-500 duration-350 placeholder:text-santas-gray-500/75 border-solid !border-[1px] border-santas-gray-500/25 hover:border-santas-gray-500/50 group-[&amp;.error]/form:border-primary">
      <label class="block text-[14px] font-medium text-port-gray-950 dark:text-white leading-tight mt-[15px] text-center">Type your domain to get your free dark web report</label>
    </div>
    <div class="form-el group/form min-lg:absolute min-lg:right-[5px] min-lg:top-[5px]">
      <button
        class="button group/button h-[52px] sm:w-full px-[20px] duration-350 flex items-center justify-center rounded-[10px] bg-primary hover:bg-[#DB1937] focus:bg-[#BD0320] active:bg-[#BD0320] dark:disabled:bg-[#9C9C9C] disabled:bg-[#E6E6E6] disabled:pointer-events-none">
        <div class="text duration-350 relative z-2 text-white text-[18px] xl:text-[16px] font-semibold text-center whitespace-nowrap group-disabled/button:text-[#B3B3B3] dark:group-disabled/button:text-[#797979]">
          <div
            class="icon icon-arrow-right text-[14px] h-[14px] block leading-none duration-350 text-secondary group-focus/button:text-[#FFFFFF] group-active/button:text-[#E21636] group-active/button:translate-x-[10px] group-disabled/button:text-[#FFFFFF] dark:group-disabled/button:text-[#9C9C9C]">
          </div>
        </div>
      </button>
    </div>
  </div>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/21028238/c5d75458-f8b1-49d4-aad9-32f0175a819c

<form id="hsForm_c5d75458-f8b1-49d4-aad9-32f0175a819c" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/21028238/c5d75458-f8b1-49d4-aad9-32f0175a819c"
  class="hs-form-private hsForm_c5d75458-f8b1-49d4-aad9-32f0175a819c hs-form-c5d75458-f8b1-49d4-aad9-32f0175a819c hs-form-c5d75458-f8b1-49d4-aad9-32f0175a819c_9c76d199-841f-4bf4-a983-8b49bee160be hs-form stacked hs-custom-form hs-custom-style"
  target="target_iframe_c5d75458-f8b1-49d4-aad9-32f0175a819c" data-instance-id="9c76d199-841f-4bf4-a983-8b49bee160be" data-form-id="c5d75458-f8b1-49d4-aad9-32f0175a819c" data-portal-id="21028238"
  data-test-id="hsForm_c5d75458-f8b1-49d4-aad9-32f0175a819c" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your Business Email Address"
      for="email-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>Business Email Address</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-c5d75458-f8b1-49d4-aad9-32f0175a819c" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_campaign-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_campaign"
      for="utm_campaign-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_campaign</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_campaign" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_content-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_content"
      for="utm_content-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_content</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_content" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_source-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_source"
      for="utm_source-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_source</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_source" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_medium-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_medium"
      for="utm_medium-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_medium</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_medium" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_term-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_term"
      for="utm_term-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_term</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_term" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe Now"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1733399024041&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1732862268976&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;disableCookieSubmission&quot;:&quot;true&quot;,&quot;notifyHubSpotOwner&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems; OSS-Fuzz Finds 26 Hidden Flaws - SOCRadar® Cyber Intelligence Inc.&quot;,&quot;pageUrl&quot;:&quot;https://socradar.io/privilege-escalation-risks-in-needrestart-utility-threaten-linux-systems-oss-fuzz-finds-26-hidden-flaws/&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;0e290996bb9adaec17f1083ce573bc9f&quot;,&quot;__hsfp&quot;:1372317473,&quot;__hssc&quot;:&quot;83077705.1.1733399028911&quot;,&quot;__hstc&quot;:&quot;83077705.0e290996bb9adaec17f1083ce573bc9f.1733399028911.1733399028911.1733399028911.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-9c76d199-841f-4bf4-a983-8b49bee160be&quot;,&quot;rumScriptExecuteTime&quot;:3865.900001525879,&quot;rumTotalRequestTime&quot;:4142.300001144409,&quot;rumTotalRenderTime&quot;:4183.700000762939,&quot;rumServiceResponseTime&quot;:276.3999996185303,&quot;rumFormRenderTime&quot;:41.39999961853027,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1733399028923,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;21028238&quot;,&quot;formId&quot;:&quot;c5d75458-f8b1-49d4-aad9-32f0175a819c&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-9c76d199-841f-4bf4-a983-8b49bee160be&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;deactivateSmartForm&quot;:true,&quot;css&quot;:&quot;&quot;,&quot;isMobileResponsive&quot;:true,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked hs-custom-form&quot;}},&quot;correlationId&quot;:&quot;9c76d199-841f-4bf4-a983-8b49bee160be&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;utm_campaign&quot;,&quot;utm_content&quot;,&quot;utm_source&quot;,&quot;utm_medium&quot;,&quot;utm_term&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.6227&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.6227&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;6227&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1733399024126,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;onFormSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1733399024127,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems; OSS-Fuzz Finds 26 Hidden Flaws - SOCRadar® Cyber Intelligence Inc.\&quot;,\&quot;pageUrl\&quot;:\&quot;https://socradar.io/privilege-escalation-risks-in-needrestart-utility-threaten-linux-systems-oss-fuzz-finds-26-hidden-flaws/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1733399024130,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;US\&quot;&quot;},{&quot;clientTimestamp&quot;:1733399028917,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;0e290996bb9adaec17f1083ce573bc9f\&quot;}&quot;}]}"><iframe
    name="target_iframe_c5d75458-f8b1-49d4-aad9-32f0175a819c" style="display: none;"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/21028238/c5d75458-f8b1-49d4-aad9-32f0175a819c

<form id="hsForm_c5d75458-f8b1-49d4-aad9-32f0175a819c" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/21028238/c5d75458-f8b1-49d4-aad9-32f0175a819c"
  class="hs-form-private hsForm_c5d75458-f8b1-49d4-aad9-32f0175a819c hs-form-c5d75458-f8b1-49d4-aad9-32f0175a819c hs-form-c5d75458-f8b1-49d4-aad9-32f0175a819c_53874af5-16e1-4260-93f1-476eed55c441 hs-form stacked hs-custom-form hs-custom-style"
  target="target_iframe_c5d75458-f8b1-49d4-aad9-32f0175a819c" data-instance-id="53874af5-16e1-4260-93f1-476eed55c441" data-form-id="c5d75458-f8b1-49d4-aad9-32f0175a819c" data-portal-id="21028238"
  data-test-id="hsForm_c5d75458-f8b1-49d4-aad9-32f0175a819c" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your Business Email Address"
      for="email-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>Business Email Address</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-c5d75458-f8b1-49d4-aad9-32f0175a819c" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_campaign-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_campaign"
      for="utm_campaign-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_campaign</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_campaign" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_content-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_content"
      for="utm_content-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_content</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_content" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_source-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_source"
      for="utm_source-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_source</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_source" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_medium-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_medium"
      for="utm_medium-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_medium</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_medium" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_term-c5d75458-f8b1-49d4-aad9-32f0175a819c" class="" placeholder="Enter your utm_term"
      for="utm_term-c5d75458-f8b1-49d4-aad9-32f0175a819c"><span>utm_term</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="utm_term" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe Now"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1733399024136&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1732862268976&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;disableCookieSubmission&quot;:&quot;true&quot;,&quot;notifyHubSpotOwner&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems; OSS-Fuzz Finds 26 Hidden Flaws - SOCRadar® Cyber Intelligence Inc.&quot;,&quot;pageUrl&quot;:&quot;https://socradar.io/privilege-escalation-risks-in-needrestart-utility-threaten-linux-systems-oss-fuzz-finds-26-hidden-flaws/&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;0e290996bb9adaec17f1083ce573bc9f&quot;,&quot;__hsfp&quot;:1372317473,&quot;__hssc&quot;:&quot;83077705.1.1733399028911&quot;,&quot;__hstc&quot;:&quot;83077705.0e290996bb9adaec17f1083ce573bc9f.1733399028911.1733399028911.1733399028911.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-53874af5-16e1-4260-93f1-476eed55c441&quot;,&quot;rumScriptExecuteTime&quot;:3971.800001144409,&quot;rumTotalRequestTime&quot;:4206.400001525879,&quot;rumTotalRenderTime&quot;:4221.60000038147,&quot;rumServiceResponseTime&quot;:234.60000038146973,&quot;rumFormRenderTime&quot;:15.19999885559082,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1733399028927,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;21028238&quot;,&quot;formId&quot;:&quot;c5d75458-f8b1-49d4-aad9-32f0175a819c&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-53874af5-16e1-4260-93f1-476eed55c441&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;deactivateSmartForm&quot;:true,&quot;css&quot;:&quot;&quot;,&quot;isMobileResponsive&quot;:true,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked hs-custom-form&quot;}},&quot;correlationId&quot;:&quot;53874af5-16e1-4260-93f1-476eed55c441&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;utm_campaign&quot;,&quot;utm_content&quot;,&quot;utm_source&quot;,&quot;utm_medium&quot;,&quot;utm_term&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.6227&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.6227&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;6227&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1733399024193,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;onFormSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1733399024193,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems; OSS-Fuzz Finds 26 Hidden Flaws - SOCRadar® Cyber Intelligence Inc.\&quot;,\&quot;pageUrl\&quot;:\&quot;https://socradar.io/privilege-escalation-risks-in-needrestart-utility-threaten-linux-systems-oss-fuzz-finds-26-hidden-flaws/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1733399024194,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;US\&quot;&quot;},{&quot;clientTimestamp&quot;:1733399028924,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;0e290996bb9adaec17f1083ce573bc9f\&quot;}&quot;}]}"><iframe
    name="target_iframe_c5d75458-f8b1-49d4-aad9-32f0175a819c" style="display: none;"></iframe>
</form>

Text Content

 * Products Products
   
   
   EXTENDED THREAT INTELLIGENCE PLATFORM
   
   Threat intelligence enriched with External Attack Surface Management, Brand
   Protection, and Dark Web Radar.
   
   
   
   Plans & Pricing
   Advanced Dark Web Monitoring
   
   
   Protect your business from the dangers lurking in the hidden corners of the
   internet.
   
   Cyber Threat Intelligence
   
   
   Effective threat hunting and threat actor tracking with behavioral analytics.
   
   Attack Surface Management
   
   
   Discover your assets with a hacker mindset.
   
   Brand Protection
   
   
   Stay ahead of threat actors with actionable intelligence alerts.
   
   Supply Chain Intelligence
   
   
   Evaluate the security posture of your entire supply network.
   
   
   See Modules
   
 * Solutions Solutions
   
   Use Cases
   
   Your guide in harnessing the full potential of our platform.
   
   Credentials & Data Leak Detection
   
   Phishing Domain Detection
   
   VIP Protection
   
   IOC Enrichment & SOAR Integration
   Customer Stories
   
   
   Hear SOCRadar's impressive achievements from our clients.
   
   Integrations
   
   
   Automate and operationalize your security operations.
   
   Professional Services
   
   
   Consulting and professional services for cybersecurity excellence.

 * Plans & Pricing Plans & Pricing
 * Resources Resources
   
   Reports
   
   
   Industry, sector, and region-based in-depth research.
   
   Country Reports
   
   Industry Reports
   
   Dark Web Reports
   Radar
   
   Discover the heartbeat of cyberspace through a collection showcasing the
   latest incidents.
   
   Dark Web Index
   
   Leaked Large Databases
   
   Major Cyber Attacks
   
   Critical Vulnerabilities
   
   Financial Data Breaches
   
   CTI Glossary
   Solution Brief
   
   
   Discover how XTI empowers organizations to proactively identify, mitigate,
   and respond to evolving cyber threats.
   
   On-Demand Webinars
   
   
   Register for our live webinars, and watch our on-demand webinars instantly.
   
   Whitepapers
   
   
   Dive deep into the world of cyber threats, advanced analysis techniques, and
   cutting-edge strategies.
   
   Blog
   
   
   Stay informed and up-to-date on the latest cybersecurity trends.
   
   SOCRadar Academy
   
   
   Explore SOCRadar's learning experience to fuel your cybersecurity journey
   with insights that exceed industry standards.
   
   SOCRadar University
   
   
   We offer expert-led, and exclusive trainings to help you master the latest in
   cybersecurity, trusted by over 2,000 top companies.

 * Free Tools Free Tools
   
   Dark Web Report
   
   
   Find out how popular you are on the dark web.
   
   
   IOC Radar
   
   
   Power your search with SOCRadar's IOC Radar.
   
   
   Country Threat Landscape Report
   
   
   Gain more insight into what’s happening in your company’s operating regions.
   
   
   Industry Threat Landscape Report
   
   
   Gain industry-based insights into the cybercrime ecosystem.
   
   
   External Threat Assessment Report
   
   
   Instantly access dark web findings about your organization's assets.
   
   
   External Attack Surface
   
   
   Get direct visibility into all technology assets facing the internet.
   
   
   Account Breach
   
   
   Check if there is anything about you in SOCRadar's ever-expanding breach
   database.
   
   
   Dark Mirror
   
   
   Track threat actors and groups by country or industry for effective
   follow-up.
   
   
   Campaigns
   
   
   Get detailed information on common cyberattack campaigns.
   
   
   SOC Tools
   
   
   All-in-one next-generation tools for investigating everyday events like
   phishing, malware, account breach, etc.
   
   
   Threat Actors
   
   
   Explore threat actors' tactics, techniques, activities, and detailed profiles
   targeting your industry or region.

 * Company Company
   
   About Us
   
   
   Let's get to know each other better.
   
   
   Partners
   
   
   Broaden your market reach and increase ARR with SOCRadar Extended Threat
   Intelligence.
   
   
   Events
   
   
   Get informed of our upcoming events.
   
   
   Press
   
   
   Latest news about our platform, company, and what’s being said about us.
   
   
   Career
   
   
   Begin an extraordinary journey in your professional path with SOCRadar.
   
   
   Contact
   
   
   We'd like to hear from you.
   
   
   AI Workshop
   
   
   SOCRadar Training Series - Mastering AI in Cybersecurity From Theory to
   Practice

Free Trial
Become a Partner

Login

Blog

Plans & Pricing

Login

Free Trial
Become a Partner
Table Of Content

Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems;
OSS-Fuzz Finds 26 Hidden Flaws What Are the Vulnerabilities in the ‘needrestart’
Utility? Which Ubuntu Releases Are Impacted? How Can You Address the
Vulnerabilities in needrestart? Act Now – Update Vulnerable Systems Without
Delay AI Finds Decades-Old OpenSSL Vulnerability with Fuzzing (CVE-2024-9143 and
More)
Type your domain to get your free dark web report

Home


Resources


Blog
Nov 21, 2024
7 Mins Read


PRIVILEGE ESCALATION RISKS IN ‘NEEDRESTART’ UTILITY THREATEN LINUX SYSTEMS;
OSS-FUZZ FINDS 26 HIDDEN FLAWS

Recent findings have exposed high-severity flaws in the needrestart utility, a
key component in Ubuntu Server installations.

The utility’s primary function is to check if a system or its services require a
restart after software updates, especially when shared libraries are updated.
Without a restart, older versions of libraries may remain in use, leaving
systems vulnerable despite the updates.

While vital for system maintenance, the tool’s expanded capabilities and
integration with Python and Ruby interpreters since 2014, have inadvertently
introduced exploitable vulnerabilities. These vulnerabilities enable local
privilege escalation, putting system integrity and security at risk.

Additionally, Google’s OSS-Fuzz platform marked a significant advancement,
leveraging AI-powered fuzzing to identify 26 hidden vulnerabilities, including
one in the popular OpenSSL library.




WHAT ARE THE VULNERABILITIES IN THE ‘NEEDRESTART’ UTILITY?

Recent findings have exposed five high-severity vulnerabilities in the
needrestart utility, posing a serious risk to system security. These flaws allow
unprivileged users to escalate their privileges and gain root access, granting
full control over affected systems. Exploiting such access, attackers could
compromise sensitive data, deploy malware, or disrupt operations entirely.

The root cause of these vulnerabilities lies in how needrestart interacts with
interpreters such as Python and Ruby. In the case of CVE-2024-48990 and
CVE-2024-48992, attackers can manipulate environment variables like PYTHONPATH
and RUBYLIB, tricking needrestart into executing malicious code during
interpreter initialization.

Details of CVE-2024-48990 (SOCRadar Vulnerability Intelligence) – According to
the module, a PoC exploit for the flaw is already available.

For CVE-2024-48991, attackers exploit a time-of-check to time-of-use (TOCTOU)
race condition within the Python interpreter’s initialization. Then, they can
hijack the process to execute arbitrary commands, gaining unauthorized access to
system functions.

Lastly, in the case of CVE-2024-10224 and CVE-2024-11003, needrestart’s
interaction with the Module::ScanDeps Perl module is exploited to achieve root
privileges. Attackers provide crafted inputs, which the module processes to
execute malicious shell commands.

These vulnerabilities, except for CVE-2024-10224, are rated as high severity
with CVSS scores of 7.8. CVE-2024-10224, with a medium severity rating of 5.3,
does not independently enable privilege escalation. However, it becomes a
serious issue when combined with CVE-2024-11003, as needrestart passes
attacker-controlled inputs to Module::ScanDeps with root permissions.

Details of CVE-2024-10224 (SOCRadar Vulnerability Intelligence)

Another alarming aspect of these flaws is their accessibility. No user
interaction is required for exploitation – once attackers gain local access,
they can easily exploit these CVEs.


WHICH UBUNTU RELEASES ARE IMPACTED?

The needrestart vulnerabilities affect multiple Ubuntu releases, as well as
other Linux distributions including Debian, including both server and desktop
environments where the utility is installed. The impacted versions are tied to
specific package releases:

 * needrestart: Versions up to 3.6-8ubuntu4
 * libmodule-scandeps-perl: Versions below 1.35-1

These vulnerabilities are particularly concerning for Ubuntu Server
installations of Jammy (22.04), Noble (24.04), and Oracular (24.10), where
needrestart is installed by default. Desktop installations and older server
versions, such as Focal (20.04), are only vulnerable if the utility was manually
installed.

CHECK IF YOUR SYSTEM IS VULNERABLE

Users can verify if their system is running an affected version of needrestart
or libmodule-scandeps-perl by running the following command:

apt list –installed | grep “^(needrestart|libmodule-scandeps-perl)”

Compare the output with the affected versions listed above. If your system
matches any of these versions, immediate action is required to mitigate
potential risks.


HOW CAN YOU ADDRESS THE VULNERABILITIES IN NEEDRESTART?

Addressing the needrestart vulnerabilities is critical to maintaining system
security and preventing potential exploitation. Users are strongly advised to
take the following actions:

The most effective solution is to update the affected packages to their patched
versions. To update your system, run:

sudo apt update && sudo apt upgrade

Alternatively, if a full upgrade isn’t feasible, target the specific vulnerable
packages:

sudo apt update && sudo apt install –only-upgrade needrestart
libmodule-scandeps-perl 

For systems with unattended-upgrades enabled (default in Ubuntu 16.04 LTS and
later), these patches will be applied automatically within 24 hours.

If updates cannot be applied immediately, a temporary mitigation is to disable
the vulnerable interpreter scanning feature in needrestart. To do this:

 1. Edit the configuration file: sudo nano /etc/needrestart/needrestart.conf
 2. Add or modify the following line: $nrconf{interpscan} = 0;
 3. Save and exit the editor.

This disables the interpreter scanning feature, reducing exposure to
exploitation. However, this is not a permanent solution, and you should restore
the original configuration after applying the updates.


ACT NOW – UPDATE VULNERABLE SYSTEMS WITHOUT DELAY

With the high-risk potential of needrestart vulnerabilities, immediate updates
are essential, particularly for server images like Jammy, Noble, and Oracular
where needrestart is installed by default. In environments where the utility was
added manually, verify its installation and address vulnerabilities promptly to
avoid potential exploits.

For a proactive approach to managing vulnerabilities, SOCRadar’s Vulnerability
Intelligence and Attack Surface Management (ASM) modules work together, enabling
your organization to:

 * Identify critical vulnerabilities early with real-time alerts and actionable
   insights.
 * Prioritize risks to focus on vulnerabilities that pose the greatest threat.
 * Visualize your attack surface, uncovering exposed assets that could be
   targeted by attackers.
 * Streamline mitigation efforts by integrating seamlessly into your security
   workflows for faster resolution.

Quickly address issues like needrestart vulnerabilities before attackers exploit
them and strengthen your defenses against evolving threats.

SOCRadar’s Vulnerability Intelligence module page

Stay informed and secure with SOCRadar’s intelligence-driven platform. Also, for
more technical information on these vulnerabilities and remediation steps, refer
to the following resources:

 * Research Blog
 * Detailed Technical Insights
 * Ubuntu Security Advisory

Acting promptly can safeguard systems from privilege escalation and broader
compromises.


AI FINDS DECADES-OLD OPENSSL VULNERABILITY WITH FUZZING (CVE-2024-9143 AND MORE)

After examining the critical vulnerabilities in needrestart, attention now
shifts to 26 previously hidden vulnerabilities identified by Google’s OSS-Fuzz
platform. Leveraging AI-powered fuzzing techniques, these findings highlight
AI’s potential to uncover long-standing security flaws that traditional methods
have overlooked.

One key discovery, CVE-2024-9143, involves an out-of-bounds memory flaw in
OpenSSL’s elliptic curve APIs. This vulnerability, capable of enabling attackers
to execute arbitrary code or crash applications, had remained undetected for
decades until its identification through AI-powered fuzzing.

Details of CVE-2024-9143 (SOCRadar Vulnerability Intelligence)

Since August 2023, OSS-Fuzz has utilized Large Language Models (LLMs) to improve
fuzz target coverage, uncovering flaws even in code previously tested by humans.
Google’s future plans for OSS-Fuzz include advancing triaging automation for
reliable vulnerability reporting, integrating debugging tools for quicker
resolutions, and eventually automating patch generation.

For further details, visit Google’s security blog.



Share :

Related Articles
Veeam Service Provider Console (VSPC) Users Urged to Patch CVE-2024-42448 and
CVE-2024-42449
Dec 04, 2024
Old Cisco ASA Vulnerability (CVE-2014-2120) Fuels Androxgh0st Botnet Activity
Dec 04, 2024
International Operation Dismantles MATRIX: A Sophisticated Encrypted Messaging
Service
Dec 03, 2024
Zyxel Firewalls Exploited for Ransomware Attacks; 20 Security Flaws Discovered
in Advantech Access Points
Nov 29, 2024
RomCom Backdoor Attacks Use Zero-Day Exploits in Mozilla and Windows
(CVE-2024-9680 & CVE-2024-49039)
Nov 27, 2024
Subscribe to our newsletter and stay updated on the latest insights!
Business Email Address*

utm_campaign

utm_content

utm_source

utm_medium

utm_term




Subscribe to our newsletter and stay updated on the latest insights!

Business Email Address*

utm_campaign

utm_content

utm_source

utm_medium

utm_term



SOCRadar
 * Extended Threat Intelligence
 * Attack Surface Management
 * Dark Web Monitoring
 * Brand Protection
 * Cyber Threat Intelligence
 * Supply Chain Intelligence


Use Cases
 * Credential & Data Leak Detection
 * Phishing Domain Detection & Takedown
 * VIP Protection
 * IOC Enrichment & SOAR Integration


Resources
 * Reports
 * On-Demand Webinars
 * Whitepapers
 * Solution Brief
 * Blog


Free Tools
 * Dark Web Report
 * Industry Threat Landscape Report
 * Campaigns
 * IOC Radar
 * External Threat Assessment Report
 * Account Breach
 * SOC Tools
 * Country Threat Landscape Report
 * External Attack Surface
 * Dark Mirror


Company
 * About Us
 * Events
 * Career
 * Partners
 * Press
 * Contact
 * Media & Press Kit
 * Security Info


Privacy Policy

Information Security Policy

Free Services Terms and Conditions

Terms & Conditions and Refund Policy

Non-Disclosure Agreement
© 2024 SOCRadar. All rights reserved.


PROTECTION OF PERSONAL DATA COOKIE POLICY FOR THE INTERNET SITE

Protecting your personal data is one of the core principles of our organization,
SOCRadar, which operates the internet site (www.socradar.com). This Cookie Usage
Policy (“Policy”) explains the types of cookies used and the conditions under
which they are used to all website visitors and users.

Cookies are small text files stored on your computer or mobile device by the
websites you visit.

Cookies are commonly used to provide you with a personalized experience while
using a website, enhance the services offered, and improve your overall browsing
experience, contributing to ease of use while navigating a website. If you
prefer not to use cookies, you can delete or block them through your browser
settings. However, please be aware that this may affect your usage of our
website. Unless you change your cookie settings in your browser, we will assume
that you accept the use of cookies on this site.

1. WHAT KIND OF DATA IS PROCESSED IN COOKIES?

Cookies on websites collect data related to your browsing and usage preferences
on the device you use to visit the site, depending on their type. This data
includes information about the pages you access, the services and products you
explore, your preferred language choice, and other preferences.

2. WHAT ARE COOKIES AND WHAT ARE THEIR PURPOSES?

Cookies are small text files stored on your device or web server by the websites
you visit through your browsers. These small text files, containing your
preferred language and other settings, help us remember your preferences on your
next visit and assist us in making improvements to our services to enhance your
experience on the site. This way, you can have a better and more personalized
user experience on your next visit.

The main purposes of using cookies on our Internet Site are as follows:

 * Improve the functionality and performance of the website to enhance the
   services provided to you,
 * Enhance and introduce new features to the Internet Site and customize the
   provided features based on your preferences,
 * Ensure legal and commercial security for the Internet Site, yourself, and the
   Organization, and prevent fraudulent transactions through the Site,
 * Fulfill legal and contractual obligations, including those arising from Law
   No. 5651 on the Regulation of Publications on the Internet and the Fight
   Against Crimes Committed Through These Publications, as well as the
   Regulation on the Procedures and Principles Regarding the Regulation of
   Publications on the Internet.

3. TYPES OF COOKIES USED ON OUR INTERNET SITE 3.1. Session Cookies

Session cookies ensure the smooth operation of the internet site during your
visit. They are used for purposes such as ensuring the security and continuity
of our sites and your visits. Session cookies are temporary cookies and are
deleted when you close your browser; they are not permanent.

3.2. Persistent Cookies

These cookies are used to remember your preferences and are stored on your
device through browsers. Persistent cookies remain stored on your device even
after you close your browser or restart your computer. These cookies are stored
in your browser’s subfolders until deleted from your browser’s settings. Some
types of persistent cookies can be used to provide personalized recommendations
based on your usage purposes.

With persistent cookies, when you revisit our website with the same device, the
website checks if a cookie created by our website exists on your device. If so,
it is understood that you have visited the site before, and the content to be
presented to you is determined accordingly, offering you a better service.

3.3. Mandatory/Technical Cookies

Mandatory cookies are essential for the proper functioning of the visited
internet site. The purpose of these cookies is to provide necessary services by
ensuring the operation of the site. For example, they allow access to secure
sections of the internet site, use of its features, and navigation.

3.4. Analytical Cookies

These cookies gather information about how the website is used, the frequency
and number of visits, and show how visitors navigate to the site. The purpose of
using these cookies is to improve the operation of the site, increase its
performance, and determine general trend directions. They do not contain data
that can identify visitors. For example, they show the number of error messages
displayed or the most visited pages.

3.5. Functional Cookies

Functional cookies remember the choices made by visitors within the site and
recall them during the next visit. The purpose of these cookies is to provide
ease of use to visitors. For example, they prevent the need to re-enter the
user’s password on each page visited by the site user.

3.6. Targeting/Advertising Cookies

They measure the effectiveness of advertisements shown to visitors and calculate
how many times ads are displayed. The purpose of these cookies is to present
personalized advertisements to visitors based on their interests.

Similarly, they determine the specific interests of visitors’ navigation and
present appropriate content. For example, they prevent the same advertisement
from being shown again to the visitor in a short period.

4. HOW TO MANAGE COOKIE PREFERENCES?

To change your preferences regarding the use of cookies, block or delete
cookies, you only need to change your browser settings.

Many browsers offer options to accept or reject cookies, only accept certain
types of cookies, or receive notifications from the browser when a website
requests to store cookies on your device.

Also, it is possible to delete previously saved cookies from your browser.

If you disable or reject cookies, you may need to manually adjust some
preferences, and certain features and services on the website may not work
properly as we will not be able to recognize and associate with your account.
You can change your browser settings by clicking on the relevant link from the
table below.

5. EFFECTIVE DATE OF THE INTERNET SITE PRIVACY POLICY

The Internet Site Privacy Policy is dated  The effective date of the Policy will
be updated if the entire Policy or specific sections are renewed. The Privacy
Policy is published on the Organization’s website (www.socradar.com) and made
accessible to relevant individuals upon request.

SOCRadar
Address: 651 N Broad St, Suite 205 Middletown, DE 19709 USA
Phone: +1 (571) 249-4598
Email: info@socradar.io
Website: www.socradar.com