Local privilege escalation in OpenBSD affecting setuid programs
CVE-2019-19726

7.8HIGH

Key Information:

Vendor
OpenBSD
Status
Vendor
CVE Published:
12 December 2019

Summary

OpenBSD versions up to 6.6 are susceptible to a local privilege escalation vulnerability due to improper handling of the LD_LIBRARY_PATH environment variable in setuid programs. Attackers can exploit this flaw by setting a minimal RLIMIT_DATA resource limit, which allows them to bypass security checks implemented in the dynamic loader (ld.so). This vulnerability can be exploited during the execution of commands like chpass or passwd, permitting the attacker to run their own code with root privileges.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.