Vulnerability CVE-2009-4147


Published: 2009-12-02   Modified: 2012-02-13

Description:
The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1 and 8.0 does not clear the (1) LD_LIBMAP, (2) LD_LIBRARY_PATH, (3) LD_LIBMAP_DISABLE, (4) LD_DEBUG, and (5) LD_ELF_HINTS_PATH environment variables, which allows local users to gain privileges by executing a setuid or setguid program with a modified variable containing an untrusted search path that points to a Trojan horse library, different vectors than CVE-2009-4146.

See advisories in our WLB2 database:
Topic
Author
Date
High
FreeBSD 8.0/7.1 local root issue
Kingcope
04.12.2009

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Freebsd -> Freebsd 

 References:
http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html
http://people.freebsd.org/~cperciva/rtld.patch
http://www.securityfocus.com/archive/1/508142/100/0/threaded
http://www.securityfocus.com/archive/1/508146/100/0/threaded
http://www.securityfocus.com/bid/37154
http://www.securitytracker.com/id?1023250

Copyright 2024, cxsecurity.com

 

Back to Top