Vulnerability Name:

CVE-2005-2072 (CCN-21184)

Assigned:2005-06-28
Published:2005-06-28
Updated:2018-10-30
Summary:The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-2072

Source: FULLDISC
Type: Exploit
20050628 Solaris 9/10 ld.so fun

Source: FULLDISC
Type: Exploit
20050628 Solaris 9/10 ld.so fun

Source: FULLDISC
Type: UNKNOWN
20050628 Solaris 9/10 ld.so fun

Source: CCN
Type: SA15841
Sun Solaris Runtime Linker Privilege Escalation Vulnerability

Source: SECUNIA
Type: Vendor Advisory
15841

Source: CCN
Type: SECTRACK ID: 1014537
(Sun Issues Fix) Sun Solaris ld.so LD_AUDIT Validation Error Lets Local Users Gain Elevated Privileges

Source: SECTRACK
Type: UNKNOWN
1014537

Source: CCN
Type: Sun Alert ID: 101794
Security vulnerability in the Solaris runtime linker (ld.so.1(1))

Source: SUNALERT
Type: UNKNOWN
101794

Source: CCN
Type: CIAC INFORMATION BULLETIN P-253
Solaris Runtime Linker Vulnerability

Source: CONFIRM
Type: UNKNOWN
http://www.opensolaris.org/jive/thread.jspa?messageID=3497

Source: CCN
Type: OSVDB ID: 17614
Solaris Runtime Linker (ld.so.1) Arbitrary Privileged Code Execution

Source: BID
Type: Exploit
14074

Source: CCN
Type: BID-14074
Sun Solaris Runtime Linker LD_AUDIT Privilege Escalation Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2005-0908

Source: XF
Type: UNKNOWN
solaris-runtime-gain-access(21184)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:sun:solaris:8.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9.0:*:sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10.0:*:sparc:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::64bit:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sun solaris 8.0
    sun solaris 9.0
    sun solaris 9.0
    sun solaris 10.0
    sun sunos 5.8
    sun solaris 8
    sun solaris 9
    sun solaris 10