CVE-2009-4147

The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1 and 8.0 does not clear the (1) LD_LIBMAP, (2) LD_LIBRARY_PATH, (3) LD_LIBMAP_DISABLE, (4) LD_DEBUG, and (5) LD_ELF_HINTS_PATH environment variables, which allows local users to gain privileges by executing a setuid or setguid program with a modified variable containing an untrusted search path that points to a Trojan horse library, different vectors than CVE-2009-4146.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:09

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html - () http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html -
References () http://people.freebsd.org/~cperciva/rtld.patch - Patch () http://people.freebsd.org/~cperciva/rtld.patch - Patch
References () http://secunia.com/advisories/37517 - Vendor Advisory () http://secunia.com/advisories/37517 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/508142/100/0/threaded - () http://www.securityfocus.com/archive/1/508142/100/0/threaded -
References () http://www.securityfocus.com/archive/1/508146/100/0/threaded - () http://www.securityfocus.com/archive/1/508146/100/0/threaded -
References () http://www.securityfocus.com/bid/37154 - Exploit () http://www.securityfocus.com/bid/37154 - Exploit
References () http://www.securitytracker.com/id?1023250 - Patch () http://www.securitytracker.com/id?1023250 - Patch

Information

Published : 2009-12-02 19:30

Updated : 2024-11-21 01:09


NVD link : CVE-2009-4147

Mitre link : CVE-2009-4147

CVE.ORG link : CVE-2009-4147


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-264

Permissions, Privileges, and Access Controls