First published: Tue Nov 14 2000(Updated: )
The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library | =2.1.1 | |
GNU C Library (glibc) | =2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2000-0824 is considered high due to its potential for allowing arbitrary command execution in setuid programs.
To fix CVE-2000-0824, you should upgrade glibc to a version later than 2.1.1 that addresses this vulnerability.
Users of glibc version 2.1.1 and systems that utilize setuid programs are affected by CVE-2000-0824.
CVE-2000-0824 enables local users to execute arbitrary commands through the misuse of environmental variables.
CVE-2000-0824 is a local vulnerability, as it requires local user access to exploit.