CVE-2011-1658

Impact:
Low
Public Date:
2011-01-12
IAVA:
2011-A-0147
Bugzilla:
694873: CVE-2011-1658 glibc: ld.so insecure handling of privileged programs' RPATHs with $ORIGIN

The MITRE CVE dictionary describes this issue as:

ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value for the LD_PRELOAD environment variable, a different vulnerability than CVE-2010-3847 and CVE-2011-0536. NOTE: it is not expected that any standard operating-system distribution would ship an applicable setuid or setgid program.

Find out more about CVE-2011-1658 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 6.2
Base Metrics AV:L/AC:H/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (glibc) RHSA-2011:0413 2011-04-04
Red Hat Enterprise Linux 5 (glibc) RHSA-2011:0412 2011-04-04

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 4 glibc Will not fix

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.