ld.so in the GNU C Library (aka glibc or libc6) 2.13 and previous versions expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value for the LD_PRELOAD environment variable, a different vulnerability than CVE-2010-3847 and CVE-2011-0536. NOTE: it is not expected that any standard operating-system distribution would ship an applicable setuid or setgid program.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu glibc 1.00 |
||
gnu glibc 1.08 |
||
gnu glibc 1.07 |
||
gnu glibc 2.10.1 |
||
gnu glibc 2.1 |
||
gnu glibc 2.0.1 |
||
gnu glibc 2.0 |
||
gnu glibc 2.3.1 |
||
gnu glibc 2.3.10 |
||
gnu glibc 2.2 |
||
gnu glibc 2.2.1 |
||
gnu glibc 2.5 |
||
gnu glibc 2.5.1 |
||
gnu glibc |
||
gnu glibc 1.04 |
||
gnu glibc 1.03 |
||
gnu glibc 2.3.5 |
||
gnu glibc 2.8 |
||
gnu glibc 2.0.5 |
||
gnu glibc 2.0.4 |
||
gnu glibc 2.2.3 |
||
gnu glibc 2.2.4 |
||
gnu glibc 2.1.2 |
||
gnu glibc 2.1.3 |
||
gnu glibc 2.3.6 |
||
gnu glibc 2.4 |
||
gnu glibc 1.09.1 |
||
gnu glibc 2.11.3 |
||
gnu glibc 1.01 |
||
gnu glibc 1.05 |
||
gnu glibc 1.06 |
||
gnu glibc 2.11 |
||
gnu glibc 2.11.1 |
||
gnu glibc 2.7 |
||
gnu glibc 2.0.6 |
||
gnu glibc 2.10.2 |
||
gnu glibc 2.2.2 |
||
gnu glibc 2.3.2 |
||
gnu glibc 2.1.1 |
||
gnu glibc 2.1.1.6 |
||
gnu glibc 2.3.4 |
||
gnu glibc 2.3.3 |
||
gnu glibc 2.12.0 |
||
gnu glibc 2.12.1 |
||
gnu glibc 1.02 |
||
gnu glibc 1.09 |
||
gnu glibc 2.9 |
||
gnu glibc 2.10 |
||
gnu glibc 2.0.3 |
||
gnu glibc 2.0.2 |
||
gnu glibc 2.2.5 |
||
gnu glibc 2.3 |
||
gnu glibc 2.1.3.10 |
||
gnu glibc 2.1.9 |
||
gnu glibc 2.6 |
||
gnu glibc 2.6.1 |
||
gnu glibc 2.11.2 |
||
gnu glibc 2.12.2 |