CVE-2010-3856

GNU Glibc < 2.11.2 - Access Control

Title source: rule

Description

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44025
exploitdb WORKING POC VERIFIED
by zx2c4 · bashlocallinux
https://www.exploit-db.com/exploits/18105
exploitdb WORKING POC VERIFIED
by Tavis Ormandy · textlocallinux
https://www.exploit-db.com/exploits/15304
metasploit WORKING POC EXCELLENT
by Tavis Ormandy, zx2c4, I Can, t Race You Either, Marco Ivaldi, Todor Donev, bcoles · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb

References (24)

... and 4 more

Scores

EPSS 0.0894
EPSS Percentile 92.6%

Details

CWE
CWE-264
Status published
Products (50)
gnu/glibc 1.00
gnu/glibc 1.01
gnu/glibc 1.02
gnu/glibc 1.03
gnu/glibc 1.04
gnu/glibc 1.05
gnu/glibc 1.06
gnu/glibc 1.07
gnu/glibc 1.08
gnu/glibc 1.09
... and 40 more
Published Jan 07, 2011
Tracked Since Feb 18, 2026