6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
The gcc and gcc4 is vulnerable to Privilege Escalation. A flaw was found in the way GNU Libtoolβs libltdl library looked for libraries to load. It was possible for libltdl to load a malicious library from the current working directory. In certain configurations, if a local attacker is able to trick a local user into running a Java application (which uses a function to load native libraries, such as System.loadLibrary) from within an attacker-controlled directory containing a malicious library or module, the attacker could possibly execute arbitrary code with the privileges of the user running the Java application.
CPE | Name | Operator | Version |
---|---|---|---|
gcc | eq | 4.1.1__52.el5 | |
gcc | eq | 4.1.2__44.el5 | |
gcc | eq | 4.1.2__42.el5 | |
gcc | eq | 4.1.2__14.el5 | |
gcc | eq | 4.1.1__52.el5.2 | |
gcc | eq | 4.1.1__52.el5 | |
gcc | eq | 4.1.2__44.el5 | |
gcc | eq | 4.1.2__42.el5 | |
gcc | eq | 4.1.2__14.el5 | |
gcc | eq | 4.1.1__52.el5.2 |
ftp://ftp.gnu.org/gnu/libtool/libtool-2.2.6a-2.2.6b.diff.gz
ftp://ftp.gnu.org/gnu/libtool/libtool-2.2.6a-2.2.6b.diff.gz
git.savannah.gnu.org/cgit/libtool.git/commit/?h=branch-1-5&id=29b48580df75f0c5baa2962548a4c101ec7ed7ec
hamlib.svn.sourceforge.net/viewvc/hamlib/trunk/libltdl/Makefile.am?revision=2841&view=markup
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
lists.fedoraproject.org/pipermail/package-announce/2010-February/035133.html
lists.fedoraproject.org/pipermail/package-announce/2010-February/035168.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/054656.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/054915.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/054921.html
lists.gnu.org/archive/html/libtool/2009-11/msg00059.html
lists.gnu.org/archive/html/libtool/2009-11/msg00065.html
lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
secunia.com/advisories/37414
secunia.com/advisories/37489
secunia.com/advisories/37997
secunia.com/advisories/38190
secunia.com/advisories/38577
secunia.com/advisories/38617
secunia.com/advisories/38696
secunia.com/advisories/38915
secunia.com/advisories/39299
secunia.com/advisories/39347
secunia.com/advisories/43617
secunia.com/advisories/55721
security.gentoo.org/glsa/glsa-201311-10.xml
support.avaya.com/css/P8/documents/100074869
www.mandriva.com/security/advisories?name=MDVSA-2009:307
www.mandriva.com/security/advisories?name=MDVSA-2010:035
www.mandriva.com/security/advisories?name=MDVSA-2010:091
www.mandriva.com/security/advisories?name=MDVSA-2010:105
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2010-0039.html
www.securityfocus.com/bid/37128
www.vupen.com/english/advisories/2011/0574
access.redhat.com/errata/RHSA-2010:0039
bugzilla.redhat.com/show_bug.cgi?id=537941
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11687
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6951
rhn.redhat.com/errata/RHSA-2010-0095.html
www.redhat.com/archives/fedora-package-announce/2009-December/msg01512.html