CVE-2010-3856
GNU Glibc < 2.11.2 - Access Control
Title source: ruleDescription
ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/44025
metasploit
WORKING POC
EXCELLENT
by Tavis Ormandy, zx2c4, I Can, t Race You Either, Marco Ivaldi, Todor Donev, bcoles · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb
exploitdb
WORKING POC
VERIFIED
by Tavis Ormandy · textlocallinux
https://www.exploit-db.com/exploits/15304
References (24)
... and 4 more
Scores
EPSS
0.0528
EPSS Percentile
89.8%
Classification
CWE
CWE-264
Status
draft
Affected Products (50)
gnu/glibc
< 2.11.2
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
gnu/glibc
... and 35 more
Timeline
Published
Jan 07, 2011
Tracked Since
Feb 18, 2026