Bug 692393 (CVE-2009-5064) - CVE-2009-5064 glibc: ldd unexpected code execution issue
Summary: CVE-2009-5064 glibc: ldd unexpected code execution issue
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-5064
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: Unspecified
OS: Unspecified
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 531160 713134 716899 767685 767687 769360
Blocks: 734217 767564
TreeView+ depends on / blocked
 
Reported: 2011-03-31 08:41 UTC by Tomas Hoger
Modified: 2021-02-24 16:14 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-02-13 20:59:39 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Novell 684385 0 None None None Never
Red Hat Product Errata RHSA-2011:1526 0 normal SHIPPED_LIVE Low: glibc security, bug fix, and enhancement update 2011-12-06 01:02:21 UTC
Red Hat Product Errata RHSA-2012:0125 0 normal SHIPPED_LIVE Moderate: glibc security and bug fix update 2012-02-14 01:33:53 UTC
Red Hat Product Errata RHSA-2012:0126 0 normal SHIPPED_LIVE Moderate: glibc security update 2012-02-14 01:33:37 UTC

Description Tomas Hoger 2011-03-31 08:41:25 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-5064 to the following vulnerability:

** DISPUTED ** ldd in the GNU C Library (aka glibc or libc6) 2.13 and
earlier allows local users to gain privileges via a Trojan horse
executable file linked with a modified loader that omits certain
LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states
"This is just nonsense. There are a gazillion other ways to introduce
code if people are downloading arbitrary binaries and install them in
appropriate directories or set LD_LIBRARY_PATH etc."


References:
http://reverse.lostrealm.com/protect/ldd.html
http://www.catonmat.net/blog/ldd-arbitrary-code-execution/
http://thread.gmane.org/gmane.comp.security.oss.general/4427
https://bugzilla.redhat.com/show_bug.cgi?id=531160

Comment 2 errata-xmlrpc 2011-12-06 17:46:53 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:1526 https://rhn.redhat.com/errata/RHSA-2011-1526.html

Comment 6 errata-xmlrpc 2012-02-13 20:35:13 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0126 https://rhn.redhat.com/errata/RHSA-2012-0126.html

Comment 7 errata-xmlrpc 2012-02-13 20:35:50 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2012:0125 https://rhn.redhat.com/errata/RHSA-2012-0125.html

Comment 8 Vincent Danen 2012-02-13 20:59:39 UTC
Statement:

(none)


Note You need to log in before you can comment on or make changes to this bug.