First published: Tue Dec 19 2000(Updated: )
glibc2 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environmental variables when a program is spawned from a setuid program, which could allow local users to overwrite files via a symlink attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | =2.1.3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0959 is considered a moderate severity vulnerability because it enables local users to exploit setuid programs for file overwriting through a symlink attack.
To fix CVE-2000-0959, update glibc to the latest version where this vulnerability has been addressed.
CVE-2000-0959 affects systems running glibc version 2.1.3.10, particularly those with setuid programs.
Exploiting CVE-2000-0959 can lead to unauthorized file manipulation, allowing local users to overwrite files.
No, CVE-2000-0959 is classified as a local vulnerability requiring physical or system access to exploit.