CVE-2010-3856
GNU Glibc < 2.11.2 - Access Control
Title source: ruleDescription
ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44025
exploitdb
WORKING POC
VERIFIED
by Tavis Ormandy · textlocallinux
https://www.exploit-db.com/exploits/15304
metasploit
WORKING POC
EXCELLENT
by Tavis Ormandy, zx2c4, I Can, t Race You Either, Marco Ivaldi, Todor Donev, bcoles · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb
References (24)
... and 4 more
Scores
EPSS
0.0894
EPSS Percentile
92.6%
Details
CWE
CWE-264
Status
published
Products (50)
gnu/glibc
1.00
gnu/glibc
1.01
gnu/glibc
1.02
gnu/glibc
1.03
gnu/glibc
1.04
gnu/glibc
1.05
gnu/glibc
1.06
gnu/glibc
1.07
gnu/glibc
1.08
gnu/glibc
1.09
... and 40 more
Published
Jan 07, 2011
Tracked Since
Feb 18, 2026