// For flags

CVE-2009-5064

glibc: ldd unexpected code execution issue

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

12
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc.

**DISPUTADA** ldd en la Biblioteca de C de GNU (también conocida como glibc o libc6) v2.13 y anteriores permite a usuarios locales conseguir privilegios a través de un troyano ejecutable enlazado con un cargador modificado que omite los controles LD_TRACE_LOADED_OBJECTS determinados. NOTA: El desarrollador de la libreía C de GNU dice "Esto es un sinsentido. Hay tropecientas formas de introducir código si la gente está descargando archivos binarios y los instala en directorios adecuados o establece LD_LIBRARY_PATH, etc. "

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-03-30 CVE Reserved
  • 2011-03-30 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2025-03-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
<= 2.1.3
Search vendor "Gnu" for product "Glibc" and version " <= 2.1.3"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.00
Search vendor "Gnu" for product "Glibc" and version "1.00"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.01
Search vendor "Gnu" for product "Glibc" and version "1.01"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.02
Search vendor "Gnu" for product "Glibc" and version "1.02"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.03
Search vendor "Gnu" for product "Glibc" and version "1.03"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.04
Search vendor "Gnu" for product "Glibc" and version "1.04"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.05
Search vendor "Gnu" for product "Glibc" and version "1.05"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.06
Search vendor "Gnu" for product "Glibc" and version "1.06"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.07
Search vendor "Gnu" for product "Glibc" and version "1.07"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.08
Search vendor "Gnu" for product "Glibc" and version "1.08"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.09
Search vendor "Gnu" for product "Glibc" and version "1.09"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
1.09.1
Search vendor "Gnu" for product "Glibc" and version "1.09.1"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.0
Search vendor "Gnu" for product "Glibc" and version "2.0"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.0.1
Search vendor "Gnu" for product "Glibc" and version "2.0.1"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.0.2
Search vendor "Gnu" for product "Glibc" and version "2.0.2"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.0.3
Search vendor "Gnu" for product "Glibc" and version "2.0.3"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.0.4
Search vendor "Gnu" for product "Glibc" and version "2.0.4"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.0.5
Search vendor "Gnu" for product "Glibc" and version "2.0.5"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.0.6
Search vendor "Gnu" for product "Glibc" and version "2.0.6"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.1
Search vendor "Gnu" for product "Glibc" and version "2.1"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.1.1
Search vendor "Gnu" for product "Glibc" and version "2.1.1"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.1.1.6
Search vendor "Gnu" for product "Glibc" and version "2.1.1.6"
-
Affected
Gnu
Search vendor "Gnu"
Glibc
Search vendor "Gnu" for product "Glibc"
2.1.2
Search vendor "Gnu" for product "Glibc" and version "2.1.2"
-
Affected