Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xvp7-pvpj-c69f

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.

The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.

EPSS

Процентиль: 52%
0.00292
Низкий

Связанные уязвимости

nvd
около 20 лет назад

The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.

EPSS

Процентиль: 52%
0.00292
Низкий