cve/2017/CVE-2017-16997.md

20 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-16997](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997)
![](https://img.shields.io/static/v1?label=Product&message=glibc%202.19%20through%202.26&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=improper%20RPATH%2FRUNPATH%20validation&color=brighgreen)
### Description
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Xiami2012/CVE-2017-16997-poc
- https://github.com/ericcalabretta/inspec_resource_hab_pkg_deps
- https://github.com/flyrev/security-scan-ci-presentation