Local privilege escalation in OpenBSD affecting setuid programs
CVE-2019-19726
7.8HIGH
Summary
OpenBSD versions up to 6.6 are susceptible to a local privilege escalation vulnerability due to improper handling of the LD_LIBRARY_PATH environment variable in setuid programs. Attackers can exploit this flaw by setting a minimal RLIMIT_DATA resource limit, which allows them to bypass security checks implemented in the dynamic loader (ld.so). This vulnerability can be exploited during the execution of commands like chpass or passwd, permitting the attacker to run their own code with root privileges.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved