SB2011010705 - Multiple vulnerabilities in GNU Glibc 



SB2011010705 - Multiple vulnerabilities in GNU Glibc

Published: January 7, 2011 Updated: August 11, 2020

Security Bulletin ID SB2011010705
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 67% Medium 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-1095)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function.


2) Link following (CVE-ID: CVE-2010-3847)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2010-3856)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.


Remediation

Install update from vendor's website.

References