Vulnerability Name:

CCN-5174

Published:2000-09-02
Updated:2000-09-02
Summary:The glibc package that ships with many Linux distributions could allow a local attacker to gain root access on a system by providing a false translation file. The locale handling in glibc is designed to prevent environment variables, such as LANG and LC_*, from being used to execute arbitrary code. Under some circumstances, the program handles special characters, such as slashes and "..". An attacker could specify alternate locations for localization files to execute arbitrary code on the system and gain root access.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2000-030.0
serious vulnerability in glibc NLS code

Source: CCN
Type: BugTraq Mailing List, Wed Aug 30 2000 - 19:14:23 CDT
glibc unsetenv bug

Source: CCN
Type: BugTraq Mailing List, Wed Sep 06 2000 - 05:02:35 CDT
[slackware-security]: glibc 2.1.3 vulnerabilities patched

Source: CCN
Type: Conectiva Linux Announcement CLSA-2000:313
glibc

Source: CCN
Type: SuSE Security Announcement, September 6th, 2000
shlibs (glibc-2.0, glibc-2.1)

Source: CCN
Type: RHSA-2000:057-02
glibc vulnerabilities in ld.so, locale and gettext

Source: CCN
Type: TurboLinux Security Announcement TLSA2000021-1
glibc unsetenv and locale

Source: CCN
Type: CORE SDI S.A. Security Advisory CORE-090400
UNIX locale format string vulnerability

Source: DEBIAN
Type: Debian Security Advisory 20000902
glibc: local root exploit

Source: XF
Type: UNKNOWN
glibc-false-translation(5174)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:gnu:glibc:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    gnu glibc 2.0
    gnu glibc 2.0.1
    gnu glibc 2.0.2
    gnu glibc 2.0.3
    gnu glibc 2.0.4
    gnu glibc 2.0.5
    gnu glibc 2.0.6
    gnu glibc 2.1
    gnu glibc 2.1.1
    gnu glibc 2.1.1.6
    gnu glibc 2.1.2
    gnu glibc 2.1.3
    redhat linux 6.0