CVE-2011-0532

Current Description

The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

Basic Data

PublishedFebruary 23, 2011
Last ModifiedAugust 17, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:H/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score6.2
SeverityMEDIUM
Exploitability Score1.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationFedoraproject389 Directory Server1.2.1*******
    2.3ApplicationFedoraproject389 Directory Server1.2.2*******
    2.3ApplicationFedoraproject389 Directory Server1.2.3*******
    2.3ApplicationFedoraproject389 Directory Server1.2.5*******
    2.3ApplicationFedoraproject389 Directory Server1.2.5rc1******
    2.3ApplicationFedoraproject389 Directory Server1.2.5rc2******
    2.3ApplicationFedoraproject389 Directory Server1.2.5rc3******
    2.3ApplicationFedoraproject389 Directory Server1.2.5rc4******
    2.3ApplicationFedoraproject389 Directory Server1.2.6*******
    2.3ApplicationFedoraproject389 Directory Server1.2.6a2******
    2.3ApplicationFedoraproject389 Directory Server1.2.6a3******
    2.3ApplicationFedoraproject389 Directory Server1.2.6a4******
    2.3ApplicationFedoraproject389 Directory Server1.2.6rc1******
    2.3ApplicationFedoraproject389 Directory Server1.2.6rc2******
    2.3ApplicationFedoraproject389 Directory Server1.2.6rc3******
    2.3ApplicationFedoraproject389 Directory Server1.2.6rc6******
    2.3ApplicationFedoraproject389 Directory Server1.2.6rc7******
    2.3ApplicationFedoraproject389 Directory Server1.2.6.1*******
    2.3ApplicationFedoraproject389 Directory Server1.2.7alpha3******
    2.3ApplicationFedoraproject389 Directory Server1.2.7.5*******
    2.3ApplicationFedoraproject389 Directory Server1.2.8alpha1******
    2.3ApplicationFedoraproject389 Directory Server1.2.8alpha2******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatDirectory Server8.2*******
    2.3ApplicationRedhatDirectory Server8.2.3*******

Vulnerable Software List

VendorProductVersions
Redhat Directory Server 8.2, 8.2.3
Fedoraproject 389 Directory Server 1.2.1, 1.2.2, 1.2.3, 1.2.5, 1.2.6, 1.2.6.1, 1.2.7, 1.2.7.5, 1.2.8

References

NameSourceURLTags
RHSA-2011:0293http://www.redhat.com/support/errata/RHSA-2011-0293.htmlREDHAT
46489http://www.securityfocus.com/bid/46489BID
1025102http://www.securitytracker.com/id?1025102SECTRACK
https://bugzilla.redhat.com/show_bug.cgi?id=672468https://bugzilla.redhat.com/show_bug.cgi?id=672468CONFIRM
rhds-ldlibrarypath-priv-esc(65637)https://exchange.xforce.ibmcloud.com/vulnerabilities/65637XF