7.8 CVE-2025-4802
Patch Exploit
Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
https://nvd.nist.gov/vuln/detail/CVE-2025-4802
Categories
CWE-426 : Untrusted Search Path
References
3ff69d7a-14f2-4f67-a097-88dee7810d18 Patch
https://sourceware.org/bugzilla/show_bug.cgi?id=32976 Issue Tracking |
https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e16... Patch |
af854a3a-2127-422b-91ae-364da2661108 Patch Exploit
http://www.openwall.com/lists/oss-security/2025/05/16/7 Mailing List |
http://www.openwall.com/lists/oss-security/2025/05/17/2 Exploit Mailing List |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* | >= 2.27 | <= 2.38 |
REMEDIATION
Patch
Url |
---|
https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e16... |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
http://www.openwall.com/lists/oss-security/2025/05/17/2 |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
38 | Leveraging/Manipulating Configuration File Search Paths |
Very High |
MITRE
Techniques
id | description |
---|---|
T1574.007 | Hijack Execution Flow:Path Interception by PATH Environment Variable |
T1574.009 | Hijack Execution Flow: Path Interception by Unquoted Path |
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
Mitigations
id | description |
---|---|
M1022 | Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories. |
M1022 | Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories. |
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.