Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-4802

Опубликовано: 16 мая 2025
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

A flaw was found in the glibc library. A statically linked setuid binary that calls dlopen(), including internal dlopen() calls after setlocale() or calls to NSS functions such as getaddrinfo(), may incorrectly search LD_LIBRARY_PATH to determine which library to load, allowing a local attacker to load malicious shared libraries, escalate privileges and execute arbitrary code.

Отчет

This issue can only be exploitable by a local attacker via a static setuid program that calls the dlopen function, causing the library to search LD_LIBRARY_PATH to locate the shared object name to load. No such programs have been found in Red Hat Enterprise Linux at the time of publishing this advisory. However, custom setuid programs, although strongly discouraged as a security practice, may exist and can not be discarded. Due to these reasons, this flaw has been rated with a moderate severity. Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-426: Untrusted Search Path) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Red Hat enforces least functionality by enabling only essential features, services, and ports, thereby reducing the system’s attack surface. Static code analysis, peer reviews, and robust input validation and error handling detect unsafe input that could affect execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous system monitoring, enables rapid identification of exploitation attempts. Process isolation and Kubernetes orchestration reduce the likelihood of concurrent execution conflicts and contain any impact to isolated workloads. Executable search paths are restricted to trusted, explicitly defined directories, mitigating the risk of executing malicious files. These controls effectively lower the likelihood and impact of race conditions and untrusted path exploitation in the environment.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10glibcNot affected
Red Hat Enterprise Linux 6compat-glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7compat-glibcNot affected
Red Hat Enterprise Linux 7.7 Advanced Update SupportglibcFixedRHSA-2025:1022002.07.2025
Red Hat Enterprise Linux 7 Extended Lifecycle SupportglibcFixedRHSA-2025:1021902.07.2025
Red Hat Enterprise Linux 8glibcFixedRHSA-2025:868609.06.2025
Red Hat Enterprise Linux 8glibcFixedRHSA-2025:868609.06.2025
Red Hat Enterprise Linux 9glibcFixedRHSA-2025:865509.06.2025
Red Hat Enterprise Linux 9glibcFixedRHSA-2025:865509.06.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-426
https://bugzilla.redhat.com/show_bug.cgi?id=2367468glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH

EPSS

Процентиль: 0%
0.00008
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
3 месяца назад

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

CVSS3: 7.8
nvd
3 месяца назад

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

CVSS3: 7.8
debian
3 месяца назад

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GN ...

suse-cvrf
2 месяца назад

Security update for glibc

suse-cvrf
2 месяца назад

Security update for glibc

EPSS

Процентиль: 0%
0.00008
Низкий

7 High

CVSS3