ldd in the GNU C Library (aka glibc or libc6) 2.13 and previous versions allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu glibc 2.1.2 |
||
gnu glibc 2.0.5 |
||
gnu glibc 2.0.6 |
||
gnu glibc 1.00 |
||
gnu glibc 1.06 |
||
gnu glibc 2.1.1 |
||
gnu glibc 1.02 |
||
gnu glibc 2.0.3 |
||
gnu glibc 1.07 |
||
gnu glibc 2.0 |
||
gnu glibc 2.1.1.6 |
||
gnu glibc 1.04 |
||
gnu glibc 1.01 |
||
gnu glibc 2.1 |
||
gnu glibc |
||
gnu glibc 1.09.1 |
||
gnu glibc 2.0.1 |
||
gnu glibc 1.09 |
||
gnu glibc 2.0.4 |
||
gnu glibc 2.0.2 |
||
gnu glibc 1.03 |
||
gnu glibc 1.08 |
||
gnu glibc 1.05 |