First published: Mon Mar 26 2001(Updated: )
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mandrake Linux | =7.2 | |
Trustix Secure Linux | =1.1 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Mandrake Linux | =7.0 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.0 | |
Mandriva Linux Corporate Server | =1.0.1 | |
Turbolinux | <=6.0.5 | |
Mandrake Linux | =7.1 | |
Mandrake Linux | =6.0 | |
Red Hat Linux | =6.2 | |
Turbolinux | =6.1 | |
Red Hat Linux | =6.0 | |
Trustix Secure Linux | =1.2 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Mandrake Linux | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0169 is classified as a high-severity local security vulnerability.
To fix CVE-2001-0169, update glibc to a version that properly checks SUID/SGID permissions for preloaded libraries.
CVE-2001-0169 affects multiple Linux distributions, including Mandrake Linux, Red Hat Linux, and Trustix Secure Linux in specific versions.
CVE-2001-0169 cannot be exploited remotely; it requires local access to the affected system.
Exploitation of CVE-2001-0169 allows attackers to overwrite arbitrary files on a vulnerable system.