Vulnerability Name:

CVE-2009-4146 (CCN-54590)

Assigned:2009-12-01
Published:2009-12-01
Updated:2019-05-22
Summary:The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1, 7.2, and 8.0 does not clear the LD_PRELOAD environment variable, which allows local users to gain privileges by executing a setuid or setguid program with a modified LD_PRELOAD variable containing an untrusted search path that points to a Trojan horse library, a different vector than CVE-2009-4147.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.9 Medium (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.7 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Mon Nov 30 2009 - 16:12:20 CST
FreeBSD local r00t zeroday

Source: MITRE
Type: CNA
CVE-2009-4146

Source: CCN
Type: FreeBSD-Announce Mailing List, Tue Dec 1 01:20:40 UTC 2009
Upcoming FreeBSD Security Advisory

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/152997/FreeBSD-rtld-execl-Privilege-Escalation.html

Source: CONFIRM
Type: Exploit
http://people.freebsd.org/~cperciva/rtld.patch

Source: CCN
Type: SA37517
FreeBSD Dynamic Linker Privilege Escalation Vulnerability

Source: SECUNIA
Type: Vendor Advisory
37517

Source: CCN
Type: SECTRACK ID: 1023250
FreeBSD rtld Lets Local Users Gain Root Privileges

Source: BUGTRAQ
Type: UNKNOWN
20091130 ** FreeBSD local r00t zeroday

Source: BUGTRAQ
Type: UNKNOWN
20091201 Upcoming FreeBSD Security Advisory

Source: BUGTRAQ
Type: UNKNOWN
20091201 Re: ** FreeBSD local r00t zeroday

Source: BID
Type: Exploit
37154

Source: CCN
Type: BID-37154
FreeBSD 'execl()' Local Privilege Escalation Vulnerability

Source: SECTRACK
Type: UNKNOWN
1023250

Source: XF
Type: UNKNOWN
freebsd-ldpreload-privilege-escalation(54590)

Source: CCN
Type: Packet Storm Security [05-22-2019]
FreeBSD rtld execl() Privilege Escalation

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:7.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:7.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:8.0:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:7.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:8.0:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:7.2:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 7.1
    freebsd freebsd 7.2
    freebsd freebsd 8.0
    freebsd freebsd 7.1 -
    freebsd freebsd 8.0 -
    freebsd freebsd 7.2 -