CVE-2010-3856

GNU Glibc < 2.11.2 - Access Control

Title source: rule

Description

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44025
metasploit WORKING POC EXCELLENT
by Tavis Ormandy, zx2c4, I Can, t Race You Either, Marco Ivaldi, Todor Donev, bcoles · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb
exploitdb WORKING POC VERIFIED
by zx2c4 · bashlocallinux
https://www.exploit-db.com/exploits/18105
exploitdb WORKING POC VERIFIED
by Tavis Ormandy · textlocallinux
https://www.exploit-db.com/exploits/15304

References (24)

... and 4 more

Scores

EPSS 0.0528
EPSS Percentile 89.8%

Classification

CWE
CWE-264
Status draft

Affected Products (50)

gnu/glibc < 2.11.2
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
... and 35 more

Timeline

Published Jan 07, 2011
Tracked Since Feb 18, 2026