OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:12.567Z
Reserved: 2019-12-11T00:00:00
Link: CVE-2019-19726
No data.
Status : Modified
Published: 2019-12-12T01:15:10.823
Modified: 2024-11-21T04:35:15.750
Link: CVE-2019-19726
No data.
OpenCVE Enrichment
No data.
Weaknesses