CVE-2024-37676

8.4 HIGH

📋 TL;DR

CVE-2024-37676 is a memory corruption vulnerability in htop-dev htop version 2.20 that allows local attackers to trigger out-of-bounds memory access. This could potentially lead to arbitrary code execution or denial of service. Only users running htop v2.20 on systems where local attackers have access are affected.

💻 Affected Systems

Products:
  • htop-dev htop
Versions: Version 2.20
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where htop v2.20 is installed and local attackers can execute it

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise via arbitrary code execution as the user running htop

🟠

Likely Case

Denial of service causing htop to crash, potentially disrupting system monitoring activities

🟢

If Mitigated

Limited impact if proper privilege separation exists and htop runs with minimal privileges

🌐 Internet-Facing: LOW - htop is a local system monitoring tool not typically exposed to network interfaces
🏢 Internal Only: MEDIUM - Local attackers with access to run htop could exploit this vulnerability

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Proof of concept available on GitHub gist, requires local access and ability to run htop

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.21 or later

Vendor Advisory: https://github.com/htop-dev/htop

Restart Required: No

Instructions:

1. Check current htop version with 'htop --version'. 2. Update via package manager: 'sudo apt update && sudo apt upgrade htop' (Debian/Ubuntu) or 'sudo yum update htop' (RHEL/CentOS). 3. Verify update with 'htop --version'.

🔧 Temporary Workarounds

Remove htop execution permissions

linux

Temporarily remove execute permissions from htop binary to prevent exploitation

sudo chmod -x $(which htop)

Use alternative process monitor

linux

Replace htop with alternative system monitoring tools like top, glances, or btop

sudo apt install glances
sudo yum install glances

🧯 If You Can't Patch

  • Restrict htop execution to trusted users only using file permissions or sudoers configuration
  • Monitor for abnormal htop process behavior or crashes using system monitoring tools

🔍 How to Verify

Check if Vulnerable:

Run 'htop --version' and check if output shows version 2.20

Check Version:

htop --version

Verify Fix Applied:

Run 'htop --version' and confirm version is 2.21 or higher

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors in system logs related to htop
  • Abnormal termination of htop process

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

process.name:htop AND (event.action:segfault OR event.action:crash)

🔗 References

📤 Share & Export