Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-3856Untrusted Search Path in Glibc

Severity
7.2HIGHNVD
EPSS
8.9%
top 7.40%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 7
Latest updateMay 14

Description

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages2 packages

Debiangnu/glibc< 2.11.2-8+3
NVDgnu/glibc2.11.2+54

Patches

🔴Vulnerability Details

3
GHSA
GHSA-87g4-5jq4-wvr2: ld2022-05-14
OSV
CVE-2010-3856: ld2011-01-07
CVEList
CVE-2010-3856: ld2011-01-07

💥Exploits & PoCs

3
Exploit-DB
glibc - 'LD_AUDIT' Arbitrary DSO Load Privilege Escalation (Metasploit)2018-02-12
Exploit-DB
glibc - 'LD_AUDIT' Arbitrary DSO Load Privilege Escalation2011-11-10
Exploit-DB
GNU C Library 2.x (libc6) - Dynamic Linker LD_AUDIT Arbitrary DSO Load Privilege Escalation2010-10-22

📋Vendor Advisories

3
Ubuntu
GNU C Library vulnerabilities2010-10-22
Red Hat
glibc: ld.so arbitrary DSO loading via LD_AUDIT in setuid/setgid programs2010-10-22
Debian
CVE-2010-3856: glibc - ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before...2010

💬Community

2
Bugzilla
CVE-2010-3856 glibc: ld.so arbitrary DSO loading via LD_AUDIT in setuid/setgid programs2010-10-22
Bugzilla
CVE-2010-3856 glibc: ld.so arbitrary DSO loading via LD_AUDIT in setuid/setgid programs [fedora-all]2010-10-22
CVE-2010-3856 — Untrusted Search Path in GNU Glibc | cvebase