ld.so fails to unset LD_PRELOAD before executing suid root programs, allowing loading of insecure or malicious libraries.
ld.so, the UNIX/LINUX dynamic loader, fails in some conditions (and some operating system releases) to unset LD_PRELOAD before loading suid root programs for execution. Even though setuid root programs ignore LD_PRELOAD, programs called from suid root programs would use LD_PRELOAD and be loaded with insecure or malicious libraries and executed as root.
By altering LD_PRELOAD, attackers could cause malicious libraries to be loaded by programs called from setuid root programs, which then could execute arbitrary code as root.
Apply vendor patches; see the Systems Affected section below.
Apple Not Affected
Compaq Computer Corporation Not Affected
Fujitsu Not Affected
Hewlett Packard Not Affected
Microsoft Not Affected
OpenBSD Not Affected
SCO Not Affected
Data General Unknown
Siemens Nixdorf Unknown
The original public announcement was by Solar Designer
This document was last modified by Tim Shimeall
|Date First Published:||2001-05-17|
|Date Last Updated:||2001-06-21 19:29 UTC|