
CVE-2011-1089 – glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE
https://notcve.org/view.php?id=CVE-2011-1089
10 Apr 2011 — The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296. La función addmntent en la biblioteca C de GNU (también conocida como glibc o libc6) v2.13 y anteriores no informa de un estado de error de intentos fal... • http://openwall.com/lists/oss-security/2011/03/04/10 • CWE-16: Configuration •

CVE-2011-0536 – GNU C library dynamic linker - '$ORIGIN' Expansion
https://notcve.org/view.php?id=CVE-2011-0536
08 Apr 2011 — Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: ... • https://www.exploit-db.com/exploits/15274 • CWE-426: Untrusted Search Path •

CVE-2011-1071 – GNU glibc < 2.12.2 - 'fnmatch()' Stack Corruption
https://notcve.org/view.php?id=CVE-2011-1071
08 Apr 2011 — The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome. La Biblioteca C (también se conoce como glibc o libc6) anterior a versión 2.12.2 y Embedded GLIBC (E... • https://www.exploit-db.com/exploits/17120 • CWE-399: Resource Management Errors •

CVE-2011-1659 – glibc: fnmatch() alloca()-based memory corruption flaw
https://notcve.org/view.php?id=CVE-2011-1659
08 Apr 2011 — Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071. Desbordamiento de enteros en posix/fnmatch.c en la biblioteca de C de GNU (también conocida como glibc o libc6) v2.13 y anteriores, permite a atacantes dependientes del contexto causar una denegación... • http://code.google.com/p/chromium/issues/detail?id=48733 • CWE-189: Numeric Errors •

CVE-2011-1658 – glibc: ld.so insecure handling of privileged programs' RPATHs with $ORIGIN
https://notcve.org/view.php?id=CVE-2011-1658
08 Apr 2011 — ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value for the LD_PRELOAD environment variable, a different vulnerability than CVE-2010-3847 and CVE-2011-0536. NOTE: it is not expected that any standard... • http://secunia.com/advisories/46397 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2009-5064 – glibc: ldd unexpected code execution issue
https://notcve.org/view.php?id=CVE-2009-5064
30 Mar 2011 — ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc. **DISPUTADA** ldd en la Biblioteca de C de GNU (también conocida ... • http://openwall.com/lists/oss-security/2011/03/07/10 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-4052 – GNU glibc - 'regcomp()' Stack Exhaustion Denial of Service
https://notcve.org/view.php?id=CVE-2010-4052
13 Jan 2011 — Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD. Vulnerabilidad de lconsumo de pila de memoria en la aplicación regcomp en la Biblioteca de C de GNU (también conocido c... • https://packetstorm.news/files/id/125725 • CWE-399: Resource Management Errors •

CVE-2010-4051 – GNU libc/regcomp - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2010-4051
13 Jan 2011 — The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow." La implementación de regcomp en la librería de C de GNU (también cono... • https://packetstorm.news/files/id/125725 •

CVE-2010-3847 – glibc - '$ORIGIN' Expansion Privilege Escalation
https://notcve.org/view.php?id=CVE-2010-3847
07 Jan 2011 — elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory. elf/dl-load.c de ld.so en la Biblioteca GNU C (también conocida como glibc o libc6) hasta v2.11.2, y v2.12.x hasta v2.12.1 no maneja adecuadamente un valor de $ORIGIN de la variable de entorno LD_AUDI... • https://packetstorm.news/files/id/146337 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-426: Untrusted Search Path •

CVE-2010-3856 – glibc - 'LD_AUDIT' Arbitrary DSO Load Privilege Escalation
https://notcve.org/view.php?id=CVE-2010-3856
07 Jan 2011 — ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so. ld.so en la librería de GNU C (también conocida como glibc o libc6) anteriores a v2.11.3, y v2.12.x anteriores a v2.12.2, no restringen el uso de ... • https://packetstorm.news/files/id/173661 • CWE-264: Permissions, Privileges, and Access Controls CWE-426: Untrusted Search Path •