First published: Fri Jun 30 2023(Updated: )
The Malwarebytes EDR 1.0.11 for Linux driver doesn't properly ensure whitelisting of executable libraries loaded by executable files, allowing arbitrary code execution. The attacker can set LD_LIBRARY_PATH, set LD_PRELOAD, or run an executable file in a debugger.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Malwarebytes Endpoint Detection and Response | <=1.0.11 | |
Malwarebytes Anti-Malware | <=1.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29145 is considered a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2023-29145, update Malwarebytes EDR for Linux to a version above 1.0.11.
CVE-2023-29145 affects Malwarebytes EDR up to version 1.0.11 and Malwarebytes Anti-Malware up to version 1.0.14 on Linux.
An attacker can exploit CVE-2023-29145 to execute arbitrary code by manipulating the LD_LIBRARY_PATH or LD_PRELOAD environment variables.
As of now, there are no officially documented workarounds for CVE-2023-29145 other than updating the software.