The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2005/0908 | vdb entry vendor advisory |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101794-1 | vendor advisory |
http://www.opensolaris.org/jive/thread.jspa?messageID=3497 | |
http://securitytracker.com/id?1014537 | vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034731.html | exploit mailing list |
http://secunia.com/advisories/15841 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/14074 | vdb entry exploit |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034730.html | exploit mailing list |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034738.html | mailing list |