First published: Wed Jun 29 2005(Updated: )
The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.8 | |
Oracle Solaris SPARC | =9.0 | |
Oracle Solaris SPARC | =10.0 | |
Oracle Solaris SPARC | =9.0 | |
Oracle Solaris SPARC | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2072 is considered to have a high severity due to its potential for privilege escalation.
To mitigate CVE-2005-2072, avoid using setuid or setgid programs that rely on the LD_AUDIT environment variable or restrict the use of these programs.
CVE-2005-2072 affects Solaris 8, 9, and 10, including specific versions for both x86 and SPARC architectures.
Yes, local users can exploit CVE-2005-2072 by modifying the LD_AUDIT environment variable to reference malicious code.
CVE-2005-2072 is a local vulnerability, meaning it can only be exploited by users with local access to the system.