CVE-2010-3856

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

References

http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html

http://seclists.org/fulldisclosure/2010/Oct/344

http://seclists.org/fulldisclosure/2019/Jun/18

http://secunia.com/advisories/42787

http://security.gentoo.org/glsa/glsa-201011-01.xml

http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html

http://support.avaya.com/css/P8/documents/100121017

http://www.debian.org/security/2010/dsa-2122

http://www.mandriva.com/security/advisories?name=MDVSA-2010:212

http://www.redhat.com/support/errata/RHSA-2010-0872.html

http://www.securityfocus.com/archive/1/515545/100/0/threaded

http://www.securityfocus.com/bid/44347

http://www.ubuntu.com/usn/USN-1009-1

http://www.vmware.com/security/advisories/VMSA-2011-0001.html

http://www.vupen.com/english/advisories/2011/0025

https://bugzilla.redhat.com/show_bug.cgi?id=645672

https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html

https://rhn.redhat.com/errata/RHSA-2010-0793.html

https://seclists.org/bugtraq/2019/Jun/14

https://www.exploit-db.com/exploits/44025/

Details

Source: MITRE

Published: 2011-01-07

Updated: 2019-06-13

Type: CWE-264

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* versions up to 2.11.2 (inclusive)

cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*

Tenable Plugins

View all (24 total)

IDNameProductFamilySeverity
127161NewStart CGSL MAIN 5.04 : glibc Multiple Vulnerabilities (NS-SA-2019-0012)NessusNewStart CGSL Local Security Checks
high
89673VMware ESX Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0001) (remote check)NessusMisc.
high
81118OracleVM 3.2 : glibc (OVMSA-2015-0023) (GHOST)NessusOracleVM Local Security Checks
high
75518openSUSE Security Update : glibc (openSUSE-SU-2010:0912-1)NessusSuSE Local Security Checks
high
68141Oracle Linux 6 : glibc (ELSA-2010-0872)NessusOracle Linux Local Security Checks
high
68126Oracle Linux 5 : glibc (ELSA-2010-0793)NessusOracle Linux Local Security Checks
high
60891Scientific Linux Security Update : glibc on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
high
51501Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : eglibc, glibc vulnerability (USN-1009-2)NessusUbuntu Local Security Checks
high
51422VMSA-2011-0001 : VMware ESX third-party updates for Service Console packages glibc, sudo, and openldapNessusVMware ESX Local Security Checks
high
50912SuSE 11 / 11.1 Security Update : glibc (SAT Patch Numbers 3392 / 3393)NessusSuSE Local Security Checks
high
50798CentOS 5 : glibc (CESA-2010:0793)NessusCentOS Local Security Checks
high
50640RHEL 6 : glibc (RHSA-2010:0872)NessusRed Hat Local Security Checks
high
50605GLSA-201011-01 : GNU C library: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
50421Fedora 12 : glibc-2.11.2-3 (2010-16641)NessusFedora Local Security Checks
high
50401Fedora 14 : glibc-2.12.90-18 (2010-16851)NessusFedora Local Security Checks
high
50399Fedora 13 : glibc-2.12.1-4 (2010-16655)NessusFedora Local Security Checks
high
50388Slackware 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / current : glibc (SSA:2010-301-01)NessusSlackware Local Security Checks
high
50377SuSE 10 Security Update : glibc (ZYPP Patch Number 7201)NessusSuSE Local Security Checks
high
50373openSUSE Security Update : glibc (openSUSE-SU-2010:0913-1)NessusSuSE Local Security Checks
high
50367openSUSE Security Update : glibc (openSUSE-SU-2010:0914-1)NessusSuSE Local Security Checks
high
50341RHEL 5 : glibc (RHSA-2010:0793)NessusRed Hat Local Security Checks
high
50321Mandriva Linux Security Advisory : glibc (MDVSA-2010:212)NessusMandriva Local Security Checks
high
50318Ubuntu 8.04 LTS / 9.04 / 9.10 / 10.04 LTS / 10.10 : glibc, eglibc vulnerabilities (USN-1009-1)NessusUbuntu Local Security Checks
high
50309Debian DSA-2122-1 : glibc - missing input sanitizationNessusDebian Local Security Checks
high