CVE-2011-1658Glibc vulnerability

6 documents6 sources
Severity
3.7LOWNVD
CNA6.9
EPSS
0.1%
top 69.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8
Latest updateMay 14

Description

ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value for the LD_PRELOAD environment variable, a different vulnerability than CVE-2010-3847 and CVE-2011-0536. NOTE: it is not expected that

CVSS vector

AV:L/AC:H/C:P/I:P/A:PExploitability: 1.9 | Impact: 6.4

Affected Packages1 packages

NVDgnu/glibc2.13+57

Patches

🔴Vulnerability Details

2
GHSA
GHSA-47f6-pj9c-f35v: ld2022-05-14
CVEList
CVE-2011-1658: ld2011-04-08

📋Vendor Advisories

2
Ubuntu
GNU C Library vulnerabilities2012-03-09
Red Hat
glibc: ld.so insecure handling of privileged programs' RPATHs with $ORIGIN2011-01-12

💬Community

1
Bugzilla
CVE-2011-1658 glibc: ld.so insecure handling of privileged programs' RPATHs with $ORIGIN2011-04-08
CVE-2011-1658 — GNU Glibc vulnerability | cvebase