vendor:
N/A
by:
Sebastian Krahmer
7,8
CVSS
HIGH
Insecure getenv() by default
20
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-2012-3524
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2012-3524/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2012-3524/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2012-3524/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2012-3524/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2012-128/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-1261/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-1325/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Solaris
2012
dzug.c CVE-2012-3524 PoC
This is a PoC exploit for CVE-2012-3524, which is an insecure getenv() by default vulnerability. The exploit uses a trivial non-dbus root exploit to gain access to the system. It uses a pam_systemd vector, a spice vector, and an Xorg vector to gain access.
Mitigation:
Ensure that the getenv() function is not used in a vulnerable manner.