Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.880567
Category:CentOS Local Security Checks
Title:CentOS Update for glibc CESA-2010:0793 centos5 i386
Summary:The remote host is missing an update for the 'glibc'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'glibc'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The glibc packages contain the standard C libraries used by multiple
programs on the system. These packages contain the standard C and the
standard math libraries. Without these two libraries, a Linux system cannot
function properly.

It was discovered that the glibc dynamic linker/loader did not perform
sufficient safety checks when loading dynamic shared objects (DSOs) to
provide callbacks for its auditing API during the execution of
privileged programs. A local attacker could use this flaw to escalate
their privileges via a carefully-chosen system DSO library containing
unsafe constructors. (CVE-2010-3856)

Red Hat would like to thank Ben Hawkes and Tavis Ormandy for reporting this
issue.

All users should upgrade to these updated packages, which contain a
backported patch to correct this issue.

Affected Software/OS:
glibc on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3856
http://seclists.org/fulldisclosure/2023/Jul/31
http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
20101022 The GNU C library dynamic linker will dlopen arbitrary DSOs during setuid loads.
http://seclists.org/fulldisclosure/2010/Oct/344
20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap
http://www.securityfocus.com/archive/1/515545/100/0/threaded
20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
http://seclists.org/fulldisclosure/2019/Jun/18
20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
https://seclists.org/bugtraq/2019/Jun/14
42787
http://secunia.com/advisories/42787
44025
https://www.exploit-db.com/exploits/44025/
44347
http://www.securityfocus.com/bid/44347
ADV-2011-0025
http://www.vupen.com/english/advisories/2011/0025
DSA-2122
http://www.debian.org/security/2010/dsa-2122
GLSA-201011-01
http://security.gentoo.org/glsa/glsa-201011-01.xml
MDVSA-2010:212
http://www.mandriva.com/security/advisories?name=MDVSA-2010:212
RHSA-2010:0793
https://rhn.redhat.com/errata/RHSA-2010-0793.html
RHSA-2010:0872
http://www.redhat.com/support/errata/RHSA-2010-0872.html
SUSE-SA:2010:052
https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
USN-1009-1
http://www.ubuntu.com/usn/USN-1009-1
[libc-hacker] 20101022 [PATCH] Require suid bit on audit objects in privileged programs
http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://support.avaya.com/css/P8/documents/100121017
http://www.vmware.com/security/advisories/VMSA-2011-0001.html
https://bugzilla.redhat.com/show_bug.cgi?id=645672
http://www.openwall.com/lists/oss-security/2023/07/19/9
http://www.openwall.com/lists/oss-security/2023/07/20/1
CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.