CVE-2010-3365: insecure library loading
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
mistelix (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Karmic |
Fix Released
|
Undecided
|
Unassigned | ||
Lucid |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: mistelix
From http://
Package: mistelix
Version: 0.31-1
Severity: grave
Tags: security
User: <email address hidden>
Usertags: ldpath
Hello,
During a review of the Debian archive, I've found your package to
contain a script that can be abused by an attacker to execute arbitrary
code.
The vulnerability is introduced by an insecure change to
LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for
libraries on a directory other than the standard paths.
Vulnerable code follows:
/usr/bin/mistelix line 8:
export LD_LIBRARY_
When there's an empty item on the colon-separated list of
LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.)
If the given script is executed from a directory where a potential,
local, attacker can write files to, there's a chance to exploit this
bug.
This vulnerability has been assigned the CVE id CVE-2010-3365. Please make sure
you mention it when forwarding this report to upstream and when fixing
this bug (everywhere: upstream and here at Debian.)
[0] http://
[1] http://
Sincerely,
Raphael Geissert
CVE References
Changed in mistelix (Ubuntu Lucid): | |
status: | New → Confirmed |
Attaching a debdiff for Lucid.