First published: Tue Jan 25 2011(Updated: )
It was discovered that 398 / Red Hat Directory Server set LD_LIBRARY_PATH environment variable to insecure value containing empty path elements in various shell scripts used by DS (e.g. various backup/restore scripts instantiated for each DS instance, as well as the main initialization script). Such LD_LIBRARY_PATH setting causes ld.so dynamic linker to perform library search relative to the current working directory before searching system library directories. A local attacker able to trick a user running those scripts (usually the root user) to run them while working from an attacker writeable directory could use this flaw to escalate their privileges via specially crated dynamic library.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Directory Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-672468 is considered moderate due to the presence of insecure environment variable settings.
To fix REDHAT-BUG-672468, ensure that LD_LIBRARY_PATH does not contain any empty path elements in the relevant shell scripts.
REDHAT-BUG-672468 affects various versions of Red Hat Directory Server that utilize the insecure shell scripts.
The security risk posed by REDHAT-BUG-672468 includes potential code execution due to improper handling of the LD_LIBRARY_PATH environment variable.
Temporary workarounds for REDHAT-BUG-672468 include modifying shell scripts to sanitize the LD_LIBRARY_PATH variable before execution.