[Full-disclosure] DLL hijacking on Linux
timb at nth-dimension.org.uk
Wed Aug 25 00:26:22 BST 2010
If you've seen the recent Microsoft advisory. I put together a nice post on a
similar DLL hijacking issue that affects Linux (and other POSIX-alikes). You
can read the full details on my blog (http://www.nth-
dimension.org.uk/blog.php?id=87) but the key point is that an empty directory
specification statement in LD_LIBRARY_PATH, PATH (and probably others) is
equivalent to $CWD. That is to say that LD_LIBRARY_PATH=":/lib" is equivalent
to LD_LIBRARY_PATH=".:/lib". It can occur when a script has
LD_LIBRARY_PATH="$LD_LIBRARY_PATH:/lib" or similar and LD_LIBRARY_PATH hasn't
previously been defined. It's worth checking for this kind of thing in scripts
that may be run via sudo/su when auditing hosts. I don't believe it's a
vulnerability per se, but particular instances of broken scripts may well be.
<mailto:timb at nth-dimension.org.uk>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 836 bytes
Desc: This is a digitally signed message part.
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20100825/13b18fc2/attachment.bin
Full-Disclosure is hosted and sponsored by Secunia.