Описание
The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.
The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-2072
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034730.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034731.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034738.html
- http://secunia.com/advisories/15841
- http://securitytracker.com/id?1014537
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101794-1
- http://www.opensolaris.org/jive/thread.jspa?messageID=3497
- http://www.securityfocus.com/bid/14074
- http://www.vupen.com/english/advisories/2005/0908
EPSS
CVE ID
Связанные уязвимости
The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.
EPSS