[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040820072453.GA9801@jim.sh>
Date: Fri, 20 Aug 2004 03:24:53 -0400
From: Jim Paris <jim@...n.com>
To: bugtraq@...urityfocus.com
Subject: Re: [ GLSA 200408-16 ] glibc: Information leak with LD_DEBUG
> Silvio Cesare discovered a potential information leak in glibc. It
> allows LD_DEBUG on SUID binaries where it should not be allowed. This
> has various security implications, which may be used to gain
> confidentional information.
It's worse than that. You can essentially single-step through the
library calls of a binary by turning on verbose debugging through
LD_DEBUG and then carefully controlling stdout so that the program
blocks while writing the debugging output. I've used this to exploit
race conditions in setuid binaries that would otherwise be nearly
impossible to trigger.
Gentoo's method of adding LD_DEBUG to UNSECURE_ENVVARS will prevent
this.
-jim
Powered by blists - more mailing lists