GLSA-201312-01 : GNU C Library: Multiple vulnerabilities

medium Nessus Plugin ID 71167


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201312-01 (GNU C Library: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in GNU C Library. Please review the CVE identifiers referenced below for details.
Impact :

A local attacker could trigger vulnerabilities in dynamic library loader, making it possible to load attacker-controlled shared objects during execution of setuid/setgid programs to escalate privileges.
A context-dependent attacker could trigger various vulnerabilities in GNU C Library, including a buffer overflow, leading to execution of arbitrary code or a Denial of Service.
Workaround :

There is no known workaround at this time.


All GNU C Library users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=sys-libs/glibc-2.15-r3'

See Also

Plugin Details

Severity: Medium

ID: 71167

File Name: gentoo_GLSA-201312-01.nasl

Version: 1.11

Type: local

Published: 12/3/2013

Updated: 1/6/2021

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.7

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:glibc, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/3/2013

Exploitable With


Core Impact

Metasploit (glibc "$ORIGIN" Expansion Privilege Escalation)

Reference Information

CVE: CVE-2009-5029, CVE-2010-3847, CVE-2011-0536, CVE-2011-1071, CVE-2011-1089, CVE-2011-1095, CVE-2011-1658, CVE-2011-1659, CVE-2012-0864

BID: 44154, 46563, 46740, 47370, 50898, 52201

GLSA: 201312-01