[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : ld.so unsetenv problem

Title: ld.so unsetenv problem
Released by: Caldera
Date: 24th August 2000
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



______________________________________________________________________________

   Caldera Systems, Inc.  Security Advisory



Subject: ld.so unsetenv problem

Advisory number: CSSA-2000-028.0

Issue date: 2000 August, 24

Cross reference:

______________________________________________________________________________





1. Problem Description



   A bug has been discovered in ld.so that could allow local

   users to obtain super user privilege.



   The dynamic loader ld.so is responsible for making shared

   libraries available within a program at run-time. Normally,

   a user is allowed to load additional shared libraries when

   executing a program; they can be specified with environment

   variables like LD_PRELOAD.



   Since this is not acceptable for applications that run setuid

   root, ld.so normally removes these environment variables for

   these.



   The bug causes these environment variables to not be removed

   completely under some circumstances.  While setuid programs

   themselves are not vulnerable, external programs they execute

   can be affected by this problem.



   So far, no exploit has been published.  However, we

   nevertheless recommend to update glibc (which contains

   ld.so) because of the potential risks.



2. Vulnerable Versions



   System                       Package

   -----------------------------------------------------------

   OpenLinux Desktop 2.3        All packages previous to

   glibc-2.1.1-2



   OpenLinux eServer 2.3        All packages previous to

   and OpenLinux eBuilder       glibc-2.1.3-3S



   OpenLinux eDesktop 2.4 All packages previous to

                                glibc-2.1.2-4



3. Solution



   Workaround:



   none



   We recommend our users to upgrade to the new packages.



4. OpenLinux Desktop 2.3



   4.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS



   4.2 Verification



   c157fd6b875d5823200984fbfeb10dea  RPMS/glibc-2.1.1-2.i386.rpm

   feb9215b56eb4c715dff9c3f6a890a2e  RPMS/glibc-devel-2.1.1-2.i386.rpm

   9291761b0c03d7f54ca252fc22af8bdc  RPMS/glibc-devel-static-2.1.1-2.i386.rpm

   2584a2a494b7009342324bf2391b17dc  RPMS/glibc-localedata-2.1.1-2.i386.rpm

   de9d14020a0b4283656e9a01ca7f0bd8  SRPMS/glibc-2.1.1-2.src.rpm

   4.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv glibc-*i386.rpm



5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0



   5.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS



   5.2 Verification



   c8f5ee3e789cdcc7544fd215e8aa9824  RPMS/glibc-2.1.3-3S.i386.rpm

   bec5b2aa1cc780dbdc1fd68ed7400256  RPMS/glibc-devel-2.1.3-3S.i386.rpm

   90e708d06f598e2eca9609f7a2329682  RPMS/glibc-devel-static-2.1.3-3S.i386.rpm

   e1e255eb10ad693a26d695d1db04b7fd  RPMS/glibc-localedata-2.1.3-3S.i386.rpm

   d5c3de3b296496f2c1f08b53f10d6bb6  SRPMS/glibc-2.1.3-3S.src.rpm



   5.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv glibc-*i386.rpm



6. OpenLinux eDesktop 2.4



   6.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS



   6.2 Verification



   734787918b8d5f85c2c4564bf8470ee3  RPMS/glibc-2.1.2-4.i386.rpm

   73976743de20e3883aff47274d56e00e  RPMS/glibc-devel-2.1.2-4.i386.rpm

   0baea7c2c3fc4cd127b0904a76d4125f  RPMS/glibc-devel-static-2.1.2-4.i386.rpm

   1d253bc28eabc199d5c9aec734ffef4a  RPMS/glibc-localedata-2.1.2-4.i386.rpm

   b0ac7210766f0e48a8a6726f62c18381  SRPMS/glibc-2.1.2-4.src.rpm



   6.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv glibc-*i386.rpm



7. References



   This and other Caldera security resources are located at:



   http://www.calderasystems.com/support/security/index.html



   This security fix closes Caldera's internal Problem Report 7512.



8. Disclaimer



   Caldera Systems, Inc. is not responsible for the misuse of any of the

   information we provide on this website and/or through our security

   advisories. Our advisories are a service to our customers intended to

   promote secure installation and use of Caldera OpenLinux.



______________________________________________________________________________

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.0.0 (GNU/Linux)

Comment: For info see http://www.gnupg.org



iD8DBQE5pSty18sy83A/qfwRAj66AJ0c8Ez5oVCeehQtM0QLHSQsGGDkuQCfdgz3

4DQQP0NY6Vqwt4mr6qfbExs=

=CErA

-----END PGP SIGNATURE-----








(C) 1999-2000 All rights reserved.