CVE-2019-19726
moderate-risk
Published 2019-12-12
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.
Do I need to act?
~
9.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (18)
Third Party Advisory
http://packetstormsecurity.com/files/155764/OpenBSD-Dynamic-Loader-chpass-Privil...
Third Party Advisory
http://packetstormsecurity.com/files/155764/OpenBSD-Dynamic-Loader-chpass-Privil...
47
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
18/34 · Moderate
Exposure
5/34 · Minimal