Vulnerability Name:

CVE-2000-0824 (CCN-5173)

Assigned:2000-09-02
Published:2000-09-02
Updated:2017-10-10
Summary:The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Other
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2000-030.0
serious vulnerability in glibc NLS code

Source: CCN
Type: BugTraq Mailing List, Wed Aug 30 2000 - 19:14:23 CDT
glibc unsetenv bug

Source: BUGTRAQ
Type: UNKNOWN
20000902 Conectiva Linux Security Announcement - glibc

Source: BUGTRAQ
Type: UNKNOWN
20000905 Conectiva Linux Security Announcement - glibc

Source: BUGTRAQ
Type: UNKNOWN
20000906 [slackware-security]: glibc 2.1.3 vulnerabilities patched

Source: CCN
Type: BugTraq Mailing List, Wed Sep 06 2000 - 05:02:35 CDT
[slackware-security]: glibc 2.1.3 vulnerabilities patched

Source: MITRE
Type: CNA
CVE-2000-0824

Source: CCN
Type: Conectiva Linux Announcement CLSA-2000:313
glibc

Source: CCN
Type: SuSE Security Announcement, September 6th, 2000
shlibs (glibc-2.0, glibc-2.1)

Source: BUGTRAQ
Type: UNKNOWN
19990917 A few bugs...

Source: CCN
Type: RHSA-2000:057-02
glibc vulnerabilities in ld.so, locale and gettext

Source: CCN
Type: TurboLinux Security Announcement TLSA2000021-1
glibc unsetenv and locale

Source: CALDERA
Type: UNKNOWN
CSSA-2000-028.0

Source: CCN
Type: CORE SDI S.A. Security Advisory CORE-090400
UNIX locale format string vulnerability

Source: DEBIAN
Type: UNKNOWN
20000902 glibc: local root exploit

Source: DEBIAN
Type: Debian Security Advisory 20000902
glibc: local root exploit

Source: CCN
Type: US-CERT VU#686403
ld.so fails to unset LD_PRELOAD before executing suid root programs

Source: CCN
Type: US-CERT VU#846832
glibc unsetenv fails to properly handle environment variables passed more than once to a program

Source: CCN
Type: Linux-Mandrake Security Update Advisory MDKSA-2000:040
glibc

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2000:040

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2000:045

Source: SUSE
Type: UNKNOWN
20000924 glibc locale security problem

Source: CCN
Type: OSVDB ID: 1077
GNU C Library (glibc) unsetenv Environment Variable Command Execution

Source: REDHAT
Type: UNKNOWN
RHSA-2000:057

Source: BUGTRAQ
Type: Patch, Vendor Advisory
20000831 glibc unsetenv bug

Source: BID
Type: UNKNOWN
1639

Source: CCN
Type: BID-1639
glib unsetenv() Duplicate Entry Removal Vulnerability

Source: BID
Type: Exploit, Patch, Vendor Advisory
648

Source: CCN
Type: BID-648
FSF GNU glibc unsetenv Vulnerability

Source: TURBO
Type: UNKNOWN
TLSA2000020-1

Source: XF
Type: UNKNOWN
glibc-ld-unsetenv(5173)

Source: XF
Type: UNKNOWN
glibc-ld-unsetenv(5173)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnu:glibc:2.1.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:glibc:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    gnu glibc 2.1.1
    gnu glibc 2.0
    gnu glibc 2.0.1
    gnu glibc 2.0.2
    gnu glibc 2.0.3
    gnu glibc 2.0.4
    gnu glibc 2.0.5
    gnu glibc 2.0.6
    gnu glibc 2.1
    gnu glibc 2.1.1
    gnu glibc 2.1.1.6
    gnu glibc 2.1.2
    gnu glibc 2.1.3
    redhat linux 6.0