Common Vulnerabilities and Exposures (CVE)

Public dictionary of known cybersecurity flaws, providing unique identifiers (CVE IDs), descriptions, and references for security vulnerabilities in software and hardware.

CVE-2010-3847

Assigned by [email protected]

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.


Weaknesses (CWE)

CWE-59 — Improper Link Resolution Before File Access ('Link Following')

"Zip Slip" vulnerability in container management product allows writing arbitrary files outside intended directory via a container image (.tar format) with filenames that are symbolic links that point to other files within the same tar file; however, the files being pointed to can also be symbolic links to destinations outside the intended directory, bypassing the initial check."Zip Slip" vulnerability in container management product allows writing arbitrary files outside intended directory via a container image (.tar format) with filenames that are symbolic links that point to other files within the same tar file; however, the files being pointed to can also be symbolic links to destinations outside the intended directory, bypassing the initial check.

CVSS

6.9

Base Score: 6.9/10 MEDIUM

Exploitability: 1.36/10

Impact: 6/10

Access Vector

  • Availability: COMPLETE
  • Confidentiality: COMPLETE
  • Integrity: COMPLETE

Impact

  • Authentication: NONE
  • Complexity: MEDIUM
  • Vector: LOCAL

Attack Patterns (CAPEC)

CAPEC-132 — Symlink Attack

An adversary positions a symbolic link in such a manner that the targeted user or application accesses the link's endpoint, assuming that it is accessing a file with the link's name.

Typical severity: High

Prerequisites: The targeted application must perform the desired activities on a file without checking whether the file is a symbolic link or not. The adversary must be able to predict the name of the file the target application is modifying and be able to create a new symbolic link where that file would appear.

Solutions: Design: Check for the existence of files to be created, if in existence verify they are neither symlinks nor hard links before opening them. Implementation: Use randomly generated file names for temporary files. Give the files restrictive permissions.

CAPEC-17 — Using Malicious Files

An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, and message oriented middleware systems which have many integration points are particularly vulnerable, because both the programmers and the administrators must be in synch regarding the interfaces and the correct privileges for each interface.

Typical severity: Very High

Prerequisites: System's configuration must allow an attacker to directly access executable files or upload files to execute. This means that any access control system that is supposed to mediate communications between the subject and the object is set incorrectly or assumes a benign environment.

Solutions: Design: Enforce principle of least privilege Design: Run server interfaces with a non-root account and/or utilize chroot jails or other configuration techniques to constrain privileges even if attacker gains some limited access to commands. Implementation: Perform testing such as pen-testing and vulnerability scanning to identify directories, programs, and interfaces that grant direct access to executables.

CAPEC-35 — Leverage Executable Code in Non-Executable Files

An attack of this type exploits a system's trust in configuration and resource files. When the executable loads the resource (such as an image file or configuration file) the attacker has modified the file to either execute malicious code directly or manipulate the target process (e.g. application server) to execute based on the malicious configuration parameters. Since systems are increasingly interrelated mashing up resources from local and remote sources the possibility of this attack occurring is high.

Typical severity: Very High

Prerequisites: The attacker must have the ability to modify non-executable files consumed by the target software.

Solutions: Design: Enforce principle of least privilege Design: Run server interfaces with a non-root account and/or utilize chroot jails or other configuration techniques to constrain privileges even if attacker gains some limited access to commands. Implementation: Perform testing such as pen-testing and vulnerability scanning to identify directories, programs, and interfaces that grant direct access to executables. Implementation: Implement host integrity monitoring to detect any unwanted altering of configuration files. Implementation: Ensure that files that are not required to execute, such as configuration files, are not over-privileged, i.e. not allowed to execute.

CAPEC-76 — Manipulating Web Input to File System Calls

An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.

Typical severity: Very High

Prerequisites: Program must allow for user controlled variables to be applied directly to the filesystem

Solutions: Design: Enforce principle of least privilege. Design: Ensure all input is validated, and does not contain file system commands Design: Run server interfaces with a non-root account and/or utilize chroot jails or other configuration techniques to constrain privileges even if attacker gains some limited access to commands. Design: For interactive user applications, consider if direct file system interface is necessary, instead consider having the application proxy communication. Implementation: Perform testing such as pen-testing and vulnerability scanning to identify directories, programs, and interfaces that grant direct access to executables.

References

http://seclists.org/fulldisclosure/2010/Oct/257
http://seclists.org/fulldisclosure/2010/Oct/292
http://seclists.org/fulldisclosure/2010/Oct/294
http://secunia.com/advisories/42787
http://security.gentoo.org/glsa/glsa-201011-01.xml
http://sourceware.org/ml/libc-hacker/2010-10/msg00007.html
http://support.avaya.com/css/P8/documents/100120941
http://www.debian.org/security/2010/dsa-2122
http://www.kb.cert.org/vuls/id/537223
http://www.mandriva.com/security/advisories?name=MDVSA-2010:207
http://www.redhat.com/support/errata/RHSA-2010-0872.html
http://www.securityfocus.com/archive/1/515545/100/0/threaded
http://www.securityfocus.com/bid/44154
http://www.ubuntu.com/usn/USN-1009-1
http://www.vmware.com/security/advisories/VMSA-2011-0001.html
http://www.vupen.com/english/advisories/2011/0025
https://bugzilla.redhat.com/show_bug.cgi?id=643306
https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
https://rhn.redhat.com/errata/RHSA-2010-0787.html
https://www.exploit-db.com/exploits/44024/
https://www.exploit-db.com/exploits/44025/
http://seclists.org/fulldisclosure/2010/Oct/257
http://seclists.org/fulldisclosure/2010/Oct/292
http://seclists.org/fulldisclosure/2010/Oct/294
http://secunia.com/advisories/42787
http://security.gentoo.org/glsa/glsa-201011-01.xml
http://sourceware.org/ml/libc-hacker/2010-10/msg00007.html
http://support.avaya.com/css/P8/documents/100120941
http://www.debian.org/security/2010/dsa-2122
http://www.kb.cert.org/vuls/id/537223
http://www.mandriva.com/security/advisories?name=MDVSA-2010:207
http://www.redhat.com/support/errata/RHSA-2010-0872.html
http://www.securityfocus.com/archive/1/515545/100/0/threaded
http://www.securityfocus.com/bid/44154
http://www.ubuntu.com/usn/USN-1009-1
http://www.vmware.com/security/advisories/VMSA-2011-0001.html
http://www.vupen.com/english/advisories/2011/0025
https://bugzilla.redhat.com/show_bug.cgi?id=643306
https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
https://rhn.redhat.com/errata/RHSA-2010-0787.html
https://www.exploit-db.com/exploits/44024/
https://www.exploit-db.com/exploits/44025/