A vulnerability in the 'wall' command of the util-linux package on certain Linux distributions could lead to user password leaks and clipboard hijacking, posing a security risk for users.
- The CVE-2024-28085 vulnerability, known as WallEscape, allows unprivileged users to input arbitrary text on other users' terminals if mesg is set to 'y' and wall is setgid.
- Improper neutralization of escape sequences in the util-linux wall command enables bad actors to potentially leak user passwords or alter the clipboard.
- The vulnerability was introduced in a commit made in August 2013, highlighting the importance of ongoing security assessments and updates.
- The 'wall' command, designed to broadcast messages to all logged-in users, can be exploited by attackers to disseminate malicious content or manipulate user data.
- Security researcher Skyler Ferrante identified and codenamed the vulnerability WallEscape, emphasizing the need for prompt patching and mitigation strategies.