First published: Mon Mar 26 2001(Updated: )
glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Conectiva Linux | =graficas | |
Conectiva Linux | =4.2 | |
Conectiva Linux | =4.1 | |
Conectiva Linux | =6.0 | |
Conectiva Linux | =5.1 | |
CentOS Dos2unix | =7.0_beta | |
Conectiva Linux | =ecommerce | |
Conectiva Linux | =4.0es | |
Conectiva Linux | =5.0 | |
Conectiva Linux | =4.0 | |
Debian Linux | =2.3 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0170 is classified as a high-severity vulnerability due to its potential to allow local users to access arbitrary files.
To fix CVE-2001-0170, upgrade to a version of glibc that properly clears the RESOLV_HOST_CONF, HOSTALIASES, and RES_OPTIONS environment variables.
CVE-2001-0170 affects various versions of Conectiva Linux, Debian GNU/Linux, and Red Hat Linux.
CVE-2001-0170 cannot be exploited remotely, as it requires local access to the affected systems.
CVE-2001-0170 is less of a concern in modern systems as most have moved to updated versions of glibc that mitigate this vulnerability.