CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
0.4%
The glibc implementation of unsetenv() fails to properly remove one of two successive occurrences of the same environment variable if the variable is redundently passed to a program.
The glibc implementation of unsetenv(), if called to remove an environment variable that occurs two times in succession on the environment variable list, will fail to remove one of the occurences due to an off-by-one error in the implementation.
An attacker can pass multiple occurrences of a sensitive environment variable (such as LD_LIBRARY_PATH, LD_PRELOAD, etc.) to a setuid root program. Even if glibc forces that program to ignore these variables, they may be passed along to a program called from the setuid root program. Using this indirect execution, an attacker might cause malicious code to be executed as root.
Apply vendor patches; see the Systems Affected section below.
846832
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: August 31, 2000 Updated: May 16, 2001
Affected
<http://www.linuxsecurity.com/advisories/other_advisory-689.html>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23846832 Feedback>).
Notified: August 31, 2000 Updated: September 13, 2002
Affected
<http://www.linuxsecurity.com/advisories/debian_advisory-683.html>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23846832 Feedback>).
Notified: August 29, 2000 Updated: May 16, 2001
Affected
<http://www.linuxsecurity.com/advisories/mandrake_advisory-667.html>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23846832 Feedback>).
Notified: August 31, 2000 Updated: May 16, 2001
Affected
<http://www.linuxsecurity.com/advisories/turbolinux_advisory-698.html>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23846832 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
The original report of this vulnerability was by Tymm Twillman .
This document was last modified by Tim Shimeall.
CVE IDs: | CVE-2000-0824 |
---|---|
Severity Metric: | 7.09 Date Public: |