Lucene search

K
cve[email protected]CVE-2011-0536
HistoryApr 08, 2011 - 3:17 p.m.

CVE-2011-0536

2011-04-0815:17:26
web.nvd.nist.gov
61
cve-2011-0536
gnu c library
glibc
libc6
vulnerability
untrusted search path
privilege escalation
red hat enterprise linux
nvd

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.1%

Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: this issue exists because of an incorrect fix for CVE-2010-3847.

Affected configurations

NVD
Node
gnuglibcMatch2.5-49.el5_5.6
OR
gnuglibcMatch2.12-1.7.el6_0.3
AND
redhatenterprise_linux

References

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.1%