Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-3847

Опубликовано: 18 окт. 2010
Источник: redhat
CVSS2: 7.2
EPSS Низкий

Описание

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.

Дополнительная информация

Статус:

Important
Дефект:
CWE-426
https://bugzilla.redhat.com/show_bug.cgi?id=643306glibc: ld.so insecure handling of $ORIGIN in LD_AUDIT for setuid/setgid programs

EPSS

Процентиль: 89%
0.04983
Низкий

7.2 High

CVSS2

Связанные уязвимости

ubuntu
больше 14 лет назад

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.

nvd
больше 14 лет назад

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.

debian
больше 14 лет назад

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) throu ...

github
около 3 лет назад

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.

oracle-oval
больше 14 лет назад

ELSA-2010-0787: glibc security update (IMPORTANT)

EPSS

Процентиль: 89%
0.04983
Низкий

7.2 High

CVSS2