CVE-2005-2072
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
29/06/2005
Last modified:
03/04/2025
Description
The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:* | ||
cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:* | ||
cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:* | ||
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034730.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034731.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034738.html
- http://secunia.com/advisories/15841
- http://securitytracker.com/id?1014537=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101794-1
- http://www.opensolaris.org/jive/thread.jspa?messageID=3497
- http://www.securityfocus.com/bid/14074
- http://www.vupen.com/english/advisories/2005/0908
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034730.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034731.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034738.html
- http://secunia.com/advisories/15841
- http://securitytracker.com/id?1014537=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101794-1
- http://www.opensolaris.org/jive/thread.jspa?messageID=3497
- http://www.securityfocus.com/bid/14074
- http://www.vupen.com/english/advisories/2005/0908