First published: Wed Mar 30 2011(Updated: )
** DISPUTED ** ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library | =2.1.2 | |
GNU C Library | =2.0.5 | |
GNU C Library | =2.0.6 | |
GNU C Library | =1.00 | |
GNU C Library | =1.06 | |
GNU C Library | =2.1.1 | |
GNU C Library | =1.02 | |
GNU C Library | =2.0.3 | |
GNU C Library | =1.07 | |
GNU C Library | =2.0 | |
GNU C Library | =2.1.1.6 | |
GNU C Library | =1.04 | |
GNU C Library | =1.01 | |
GNU C Library | =2.1 | |
GNU C Library | <=2.1.3 | |
GNU C Library | =1.09.1 | |
GNU C Library | =2.0.1 | |
GNU C Library | =1.09 | |
GNU C Library | =2.0.4 | |
GNU C Library | =2.0.2 | |
GNU C Library | =1.03 | |
GNU C Library | =1.08 | |
GNU C Library | =1.05 | |
GNU C Library (glibc) | <=2.1.3 | |
GNU C Library (glibc) | =1.00 | |
GNU C Library (glibc) | =1.01 | |
GNU C Library (glibc) | =1.02 | |
GNU C Library (glibc) | =1.03 | |
GNU C Library (glibc) | =1.04 | |
GNU C Library (glibc) | =1.05 | |
GNU C Library (glibc) | =1.06 | |
GNU C Library (glibc) | =1.07 | |
GNU C Library (glibc) | =1.08 | |
GNU C Library (glibc) | =1.09 | |
GNU C Library (glibc) | =1.09.1 | |
GNU C Library (glibc) | =2.0 | |
GNU C Library (glibc) | =2.0.1 | |
GNU C Library (glibc) | =2.0.2 | |
GNU C Library (glibc) | =2.0.3 | |
GNU C Library (glibc) | =2.0.4 | |
GNU C Library (glibc) | =2.0.5 | |
GNU C Library (glibc) | =2.0.6 | |
GNU C Library (glibc) | =2.1 | |
GNU C Library (glibc) | =2.1.1 | |
GNU C Library (glibc) | =2.1.1.6 | |
GNU C Library (glibc) | =2.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-5064 is considered to be low due to its local attack vector and the disputed nature of the vulnerability.
To fix CVE-2009-5064, users should upgrade to a newer version of glibc that does not have this vulnerability.
CVE-2009-5064 affects users operating versions of the GNU C Library (glibc) up to and including 2.1.2 and earlier.
The implications of CVE-2009-5064 could allow local users to gain elevated privileges through cleverly crafted executable files.
CVE-2009-5064 has been disputed by the GNU C Library vendor, who asserts that the claims are unfounded.