First published: Thu Dec 12 2019(Updated: )
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openbsd | <=6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenBSD vulnerability is CVE-2019-19726.
The severity score of CVE-2019-19726 is 7.8 (high).
The vulnerability allows local users to escalate to root by defeating a check for LD_LIBRARY_PATH in setuid programs through a small RLIMIT_DATA resource limit.
Version 6.6 of OpenBSD is affected by this vulnerability.
Yes, there are references available for this vulnerability. You can find them at the following links: [link1], [link2], [link3].