Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-4802

Опубликовано: 16 мая 2025
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.

Отчет

This issue can only be exploitable by a local attacker via a static setuid program that calls the dlopen function, causing the library to search LD_LIBRARY_PATH to locate the shared object name to load. No such programs have been found in Red Hat Enterprise Linux at the time of publishing this advisory. However, custom setuid programs, although strongly discouraged as a security practice, may exist and can not be discarded. Due to these reasons, this flaw has been rated with a moderate severity.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10glibcNot affected
Red Hat Enterprise Linux 6compat-glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7compat-glibcNot affected
Red Hat Enterprise Linux 7glibcAffected
Red Hat OpenShift Container Platform 4rhcosAffected
Red Hat Enterprise Linux 8glibcFixedRHSA-2025:868609.06.2025
Red Hat Enterprise Linux 8glibcFixedRHSA-2025:868609.06.2025
Red Hat Enterprise Linux 9glibcFixedRHSA-2025:865509.06.2025
Red Hat Enterprise Linux 9glibcFixedRHSA-2025:865509.06.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-426
https://bugzilla.redhat.com/show_bug.cgi?id=2367468glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH

EPSS

Процентиль: 0%
0.00007
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 месяца назад

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

CVSS3: 7.8
nvd
около 1 месяца назад

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

CVSS3: 7.8
debian
около 1 месяца назад

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GN ...

suse-cvrf
19 дней назад

Security update for glibc

suse-cvrf
15 дней назад

Security update for glibc

EPSS

Процентиль: 0%
0.00007
Низкий

7 High

CVSS3