7.8 CVE-2025-4802

Patch Exploit
 

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
https://nvd.nist.gov/vuln/detail/CVE-2025-4802

Categories

CWE-426 : Untrusted Search Path

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* >= 2.27 <= 2.38


REMEDIATION


Patch

Url
https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e16...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
http://www.openwall.com/lists/oss-security/2025/05/17/2


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
38 Leveraging/Manipulating Configuration File Search Paths
Very High


MITRE


Techniques

id description
T1574.007 Hijack Execution Flow:Path Interception by PATH Environment Variable
T1574.009 Hijack Execution Flow: Path Interception by Unquoted Path
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.