First published: Wed Dec 02 2009(Updated: )
The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1 and 8.0 does not clear the (1) LD_LIBMAP, (2) LD_LIBRARY_PATH, (3) LD_LIBMAP_DISABLE, (4) LD_DEBUG, and (5) LD_ELF_HINTS_PATH environment variables, which allows local users to gain privileges by executing a setuid or setguid program with a modified variable containing an untrusted search path that points to a Trojan horse library, different vectors than CVE-2009-4146.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =8.0 | |
FreeBSD FreeBSD | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4147 is classified as a local privilege escalation vulnerability.
To mitigate CVE-2009-4147, you should upgrade to a patched version of FreeBSD beyond 8.0.
CVE-2009-4147 affects users of FreeBSD versions 7.1 and 8.0.
Exploitation of CVE-2009-4147 could allow local users to gain elevated privileges.
While CVE-2009-4147 is a historical vulnerability, it remains a concern for systems still using affected FreeBSD versions.