SB2017101086 - Input validation error in GNU Glibc
Published: October 10, 2017 Updated: June 28, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2000-0824)
The vulnerability allows a local user to execute arbitrary code.
The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH.
Remediation
Install update from vendor's website.
References
- http://archives.neohapsis.com/archives/bugtraq/2000-08/0436.html
- http://archives.neohapsis.com/archives/bugtraq/2000-08/0509.html
- http://archives.neohapsis.com/archives/bugtraq/2000-08/0525.html
- http://marc.info/?l=bugtraq&m=93760201002154&w=2
- http://www.calderasystems.com/support/security/advisories/CSSA-2000-028.0.txt
- http://www.debian.org/security/2000/20000902
- http://www.linux-mandrake.com/en/updates/MDKSA-2000-040.php3
- http://www.linux-mandrake.com/en/updates/MDKSA-2000-045.php3
- http://www.novell.com/linux/security/advisories/adv5_draht_glibc_txt.html
- http://www.redhat.com/support/errata/RHSA-2000-057.html
- http://www.securityfocus.com/archive/1/79537
- http://www.securityfocus.com/bid/1639
- http://www.securityfocus.com/bid/648
- http://www.turbolinux.com/pipermail/tl-security-announce/2000-September/000020.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5173