6

Local Privilege Escalation in OpenBSD's Dynamic Loader (CVE-2019-19726)

 4 years ago
source link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19726
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
CVE-ID

CVE-2019-19726

Learn more at National Vulnerability Database (NVD)

• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information

Description OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root. References Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete. Assigning CNA MITRE Corporation Date Entry Created 20191211 Disclaimer: Theentry creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE. Phase (Legacy) Assigned (20191211) Votes (Legacy) Comments (Legacy) Proposed (Legacy) N/A This is an entry on theCVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK