Vulnerabilities > CVE-2009-3736 - Local Privilege Escalation vulnerability in GNU Libtool 'libltdl' Library Search Path

047910
CVSS 6.9 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
gnu
nessus

Summary

ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-12813.NASL
    description - Tue Dec 22 2009 Jakub Jelinek <jakub at redhat.com> 4.4.2-20 - fix MEM_SIZE of reload created stack slots (#548825, PR rtl-optimization/42429) - fix addition of one character long filenames in fastjar (#549493) - Thu Dec 17 2009 Jakub Jelinek <jakub at redhat.com> 4.4.2-18 - update from gcc-4_4-branch - PRs c++/42387 - another C++ virtual dtors fix (PR c++/42386) - VTA mode and COND_EXEC fixes (PR debug/41679) - fix ICE in chrec_convert_1 (#547775) - fix debuginfo for optimized out TLS vars - use DW_AT_location with DW_OP_addr + DW_OP_stack_value instead of DW_AT_const_value with address in it, use DW_OP_addr + DW_OP_stack_value instead of DW_OP_implicit_value with address (#546017) - Mon Dec 14 2009 Jakub Jelinek <jakub at redhat.com> 4.4.2-17 - propagate TREE_NOTHROW/TREE_READONLY/DECL_PURE_P from ipa-pure-const and EH opt to all same body aliases (#547286) - don
    last seen2020-06-01
    modified2020-06-02
    plugin id43612
    published2009-12-30
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43612
    titleFedora 12 : gcc-4.4.2-20.fc12 (2009-12813)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2009-12813.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(43612);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:29");
    
      script_cve_id("CVE-2009-3736");
      script_bugtraq_id(37128);
      script_xref(name:"FEDORA", value:"2009-12813");
    
      script_name(english:"Fedora 12 : gcc-4.4.2-20.fc12 (2009-12813)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Tue Dec 22 2009 Jakub Jelinek <jakub at redhat.com>
        4.4.2-20
    
        - fix MEM_SIZE of reload created stack slots (#548825,
          PR rtl-optimization/42429)
    
      - fix addition of one character long filenames in fastjar
        (#549493)
    
        - Thu Dec 17 2009 Jakub Jelinek <jakub at redhat.com>
          4.4.2-18
    
        - update from gcc-4_4-branch
    
        - PRs c++/42387
    
        - another C++ virtual dtors fix (PR c++/42386)
    
        - VTA mode and COND_EXEC fixes (PR debug/41679)
    
        - fix ICE in chrec_convert_1 (#547775)
    
        - fix debuginfo for optimized out TLS vars
    
        - use DW_AT_location with DW_OP_addr + DW_OP_stack_value
          instead of DW_AT_const_value with address in it, use
          DW_OP_addr + DW_OP_stack_value instead of
          DW_OP_implicit_value with address (#546017)
    
      - Mon Dec 14 2009 Jakub Jelinek <jakub at redhat.com>
        4.4.2-17
    
        - propagate TREE_NOTHROW/TREE_READONLY/DECL_PURE_P from
          ipa-pure-const and EH opt to all same body aliases
          (#547286)
    
      - don't emit DWARF location list entries with no location
        or DW_AT_location with empty blocks (PR debug/41473)
    
      - fix up AMD LWP support
    
        - don't crash when mangling C++ decls inside of
          middle-end generated functions (PR c++/41183)
    
      - Fri Dec 11 2009 Jakub Jelinek <jakub at redhat.com>
        4.4.2-16
    
        - update from gcc-4_4-branch
    
        - PRs c++/27425, c++/34274, c++/42301, fortran/42268,
          java/41991, libstdc++/42273, rtl-optimization/41574,
          target/41196, target/41939 target/42263
    
      - Wed Dec 9 2009 Jakub Jelinek <jakub at redhat.com>
        4.4.2-15
    
        - VTA backports
    
        - PRs debug/42166, debug/42234, debug/42244, debug/42299
    
        - fix handling of C++ COMDAT virtual destructors
    
        - some x86/x86_64 FMA4, XOP, ABM and LWP fixes
    
        - fix a decltype handling bug in templates (PR
          c++/42277)
    
        - Fri Dec 4 2009 Jakub Jelinek <jakub at redhat.com>
          4.4.2-14
    
        - update from gcc-4_4-branch
    
        - PRs libstdc++/42261, middle-end/42049
    
        - backport C++0x ICE fix from trunk (PR c++/42266)
    
        - fortran !$omp workshare improvements (PR
          fortran/35423)
    
        - FMA4 and XOP fixes
    
        - Wed Dec 2 2009 Jakub Jelinek <jakub at redhat.com>
          4.4.2-13
    
        - fix security issues in libltdl bundled within libgcj
          (CVE-2009-3736)
    
        - Wed Dec 2 2009 Jakub Jelinek <jakub at redhat.com>
          4.4.2-12
    
        - update from gcc-4_4-branch
    
        - PRs c++/42234, fortran/41278, fortran/41807,
          fortran/42162, target/42113, target/42165
    
      - don't ICE on -O256 (#539923)
    
        - fix -mregnames on ppc/ppc64
    
        - optimize even COMDAT constructors and destructors
          without virtual bases (PR c++/3187)
    
      - Mon Nov 23 2009 Jakub Jelinek <jakub at redhat.com>
        4.4.2-11
    
    [plus 32 lines in the Changelog]
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=537941"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2009-December/033321.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?aa4ac9dc"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gcc package.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gcc");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:12");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2009/11/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2009/12/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/12/30");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^12([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 12.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC12", reference:"gcc-4.4.2-20.fc12")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gcc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_LIBLTDL7-091201.NASL
    descriptionlibtool: libltdl may load modules from the current working directory. CVE-2009-3736 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id43633
    published2010-01-05
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/43633
    titleSuSE 11 Security Update : libtool (SAT Patch Number 1626)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from SuSE 11 update information. The text itself is
    # copyright (C) Novell, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(43633);
      script_version("1.9");
      script_cvs_date("Date: 2019/10/25 13:36:35");
    
      script_cve_id("CVE-2009-3736");
    
      script_name(english:"SuSE 11 Security Update : libtool (SAT Patch Number 1626)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 11 host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "libtool: libltdl may load modules from the current working directory.
    CVE-2009-3736 has been assigned to this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=556122"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2009-3736.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply SAT patch number 1626.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libltdl7");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libltdl7-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libtool");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libtool-32bit");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/12/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/01/05");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
    
    pl = get_kb_item("Host/SuSE/patchlevel");
    if (pl) audit(AUDIT_OS_NOT, "SuSE 11.0");
    
    
    flag = 0;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"libltdl7-2.2.6-2.131.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libltdl7-2.2.6-2.131.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libltdl7-32bit-2.2.6-2.131.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"libltdl7-2.2.6-2.131.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"libtool-2.2.6-2.131.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"libltdl7-32bit-2.2.6-2.131.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"libtool-32bit-2.2.6-2.131.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libltdl7-32bit-2.2.6-2.131.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libtool-32bit-2.2.6-2.131.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2009-318.NASL
    descriptionMultiple security vulnerabilities has been identified and fixed in xmlsec1 : A missing check for the recommended minimum length of the truncated form of HMAC-based XML signatures was found in xmlsec1 prior to 1.2.12. An attacker could use this flaw to create a specially crafted XML file that forges an XML signature, allowing the attacker to bypass authentication that is based on the XML Signature specification (CVE-2009-0217). All versions of libtool prior to 2.2.6b suffers from a local privilege escalation vulnerability that could be exploited under certain conditions to load arbitrary code (CVE-2009-3736). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers This update fixes this vulnerability.
    last seen2020-06-01
    modified2020-06-02
    plugin id43021
    published2009-12-07
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43021
    titleMandriva Linux Security Advisory : xmlsec1 (MDVSA-2009:318)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandriva Linux Security Advisory MDVSA-2009:318. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(43021);
      script_version("1.17");
      script_cvs_date("Date: 2019/08/02 13:32:52");
    
      script_cve_id("CVE-2009-0217", "CVE-2009-3736");
      script_bugtraq_id(35671, 37128);
      script_xref(name:"CERT", value:"466161");
      script_xref(name:"MDVSA", value:"2009:318");
    
      script_name(english:"Mandriva Linux Security Advisory : xmlsec1 (MDVSA-2009:318)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandriva Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Multiple security vulnerabilities has been identified and fixed in
    xmlsec1 :
    
    A missing check for the recommended minimum length of the truncated
    form of HMAC-based XML signatures was found in xmlsec1 prior to
    1.2.12. An attacker could use this flaw to create a specially crafted
    XML file that forges an XML signature, allowing the attacker to bypass
    authentication that is based on the XML Signature specification
    (CVE-2009-0217).
    
    All versions of libtool prior to 2.2.6b suffers from a local privilege
    escalation vulnerability that could be exploited under certain
    conditions to load arbitrary code (CVE-2009-3736).
    
    Packages for 2008.0 are provided for Corporate Desktop 2008.0
    customers
    
    This update fixes this vulnerability."
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64xmlsec1-1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64xmlsec1-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64xmlsec1-gnutls-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64xmlsec1-gnutls1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64xmlsec1-nss-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64xmlsec1-nss1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64xmlsec1-openssl-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64xmlsec1-openssl1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libxmlsec1-1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libxmlsec1-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libxmlsec1-gnutls-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libxmlsec1-gnutls1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libxmlsec1-nss-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libxmlsec1-nss1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libxmlsec1-openssl-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libxmlsec1-openssl1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:xmlsec1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/12/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/12/07");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64xmlsec1-1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64xmlsec1-devel-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64xmlsec1-gnutls-devel-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64xmlsec1-gnutls1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64xmlsec1-nss-devel-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64xmlsec1-nss1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64xmlsec1-openssl-devel-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64xmlsec1-openssl1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libxmlsec1-1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libxmlsec1-devel-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libxmlsec1-gnutls-devel-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libxmlsec1-gnutls1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libxmlsec1-nss-devel-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libxmlsec1-nss1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libxmlsec1-openssl-devel-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libxmlsec1-openssl1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2008.0", reference:"xmlsec1-1.2.10-5.1mdv2008.0", yank:"mdv")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-12725.NASL
    description - Thu Dec 3 2009 Karsten Hopp <karsten at redhat.com> 2.2.6-11.3 - require gcc-4.4.1 from F-11-updates - Wed Dec 2 2009 Karsten Hopp <karsten at redhat.com> 2.2.6-11.2 - update to 2.2.6b, fixes CVE-2009-3736: libltdl may load and execute code from a library in the current directory - Thu Jul 30 2009 Jakub Jelinek <jakub at redhat.com> 2.2.6-11.fc11.1 - rebuilt against gcc-4.4.1 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id43372
    published2009-12-22
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43372
    titleFedora 11 : libtool-2.2.6-11.fc11.3 (2009-12725)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2009-12725.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(43372);
      script_version("1.13");
      script_cvs_date("Date: 2019/08/02 13:32:29");
    
      script_cve_id("CVE-2009-3736");
      script_bugtraq_id(37128);
      script_xref(name:"FEDORA", value:"2009-12725");
    
      script_name(english:"Fedora 11 : libtool-2.2.6-11.fc11.3 (2009-12725)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Thu Dec 3 2009 Karsten Hopp <karsten at redhat.com>
        2.2.6-11.3
    
        - require gcc-4.4.1 from F-11-updates
    
        - Wed Dec 2 2009 Karsten Hopp <karsten at redhat.com>
          2.2.6-11.2
    
        - update to 2.2.6b, fixes CVE-2009-3736: libltdl may
          load and execute code from a library in the current
          directory
    
      - Thu Jul 30 2009 Jakub Jelinek <jakub at redhat.com>
        2.2.6-11.fc11.1
    
        - rebuilt against gcc-4.4.1
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=537941"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2009-December/032899.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?698d80b8"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected libtool package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libtool");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2009/12/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/12/22");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^11([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 11.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC11", reference:"libtool-2.2.6-11.fc11.3")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libtool");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_77C14729DC5E11DE92AE02E0184B8D35.NASL
    descriptionSecunia.com Do not attempt to load an unqualified module.la file from the current directory (by default) since doing so is insecure and is not compliant with the documentation.
    last seen2020-06-01
    modified2020-06-02
    plugin id42912
    published2009-11-30
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/42912
    titleFreeBSD : libtool -- Library Search Path Privilege Escalation Issue (77c14729-dc5e-11de-92ae-02e0184b8d35)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-4340.NASL
    descriptionRemove embedded ltdl to fix CVE-2009-3736 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47356
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47356
    titleFedora 13 : gnu-smalltalk-3.1-8.fc13 (2010-4340)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2010-0039.NASL
    descriptionUpdated gcc and gcc4 packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The gcc and gcc4 packages include, among others, C, C++, and Java GNU compilers and related support libraries. libgcj contains a copy of GNU Libtool
    last seen2020-06-01
    modified2020-06-02
    plugin id43882
    published2010-01-14
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43882
    titleRHEL 3 / 4 / 5 : gcc and gcc4 (RHSA-2010:0039)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-1990.NASL
    descriptionRebuilt against system libltdl. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id52519
    published2011-03-03
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/52519
    titleFedora 15 : q-7.11-10.fc15 (2011-1990)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_2_LIBLTDL-3-091202.NASL
    descriptionlibtool: libltdl may load modules from the current working directory. CVE-2009-3736 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id43632
    published2010-01-05
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/43632
    titleopenSUSE Security Update : libltdl-3 (libltdl-3-1638)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201311-10.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201311-10 (GraphicsMagick: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in GraphicsMagick. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted image file, potentially resulting in arbitrary code execution or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id70959
    published2013-11-19
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70959
    titleGLSA-201311-10 : GraphicsMagick: Multiple vulnerabilities
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2010-0009.NASL
    descriptiona. Service Console update for COS kernel Updated COS package
    last seen2020-06-01
    modified2020-06-02
    plugin id46765
    published2010-06-01
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/46765
    titleVMSA-2010-0009 : ESXi ntp and ESX Service Console third-party updates
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-8756.NASL
    descriptionThis update addresses CVE-2009-3736: libltdl may load and execute code from a library in the current directory. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47511
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47511
    titleFedora 12 : libprelude-0.9.24.1-2.fc12 (2010-8756)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2009-1646.NASL
    descriptionUpdated libtool packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU Libtool is a set of shell scripts which automatically configure UNIX, Linux, and similar operating systems to generically build shared libraries. A flaw was found in the way GNU Libtool
    last seen2020-06-01
    modified2020-06-02
    plugin id43078
    published2009-12-09
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43078
    titleRHEL 3 / 4 / 5 : libtool (RHSA-2009:1646)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_LIBLTDL-3-091201.NASL
    descriptionlibtool: libltdl may load modules from the current working directory. CVE-2009-3736 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id43630
    published2010-01-05
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/43630
    titleopenSUSE Security Update : libltdl-3 (libltdl-3-1638)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20091208_LIBTOOL_ON_SL3_X.NASL
    descriptionCVE-2009-3736 libtool: libltdl may load and execute code from a library in the current directory A flaw was found in the way GNU Libtool
    last seen2020-06-01
    modified2020-06-02
    plugin id60702
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60702
    titleScientific Linux Security Update : libtool on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2009-1646.NASL
    descriptionUpdated libtool packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU Libtool is a set of shell scripts which automatically configure UNIX, Linux, and similar operating systems to generically build shared libraries. A flaw was found in the way GNU Libtool
    last seen2020-06-01
    modified2020-06-02
    plugin id43070
    published2009-12-09
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43070
    titleCentOS 3 / 4 / 5 : libtool (CESA-2009:1646)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2010-0039.NASL
    descriptionFrom Red Hat Security Advisory 2010:0039 : Updated gcc and gcc4 packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The gcc and gcc4 packages include, among others, C, C++, and Java GNU compilers and related support libraries. libgcj contains a copy of GNU Libtool
    last seen2020-06-01
    modified2020-06-02
    plugin id67985
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67985
    titleOracle Linux 3 / 4 / 5 : gcc / gcc4 (ELSA-2010-0039)
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2010-0009_REMOTE.NASL
    descriptionThe remote VMware ESX / ESXi host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several components and third-party libraries : - libpng - VMnc Codec - vmrun - VMware Remote Console (VMrc) - VMware Tools - vmware-authd
    last seen2020-06-01
    modified2020-06-02
    plugin id89740
    published2016-03-08
    reporterThis script is Copyright (C) 2016-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/89740
    titleVMware ESX / ESXi Third-Party Libraries and Components (VMSA-2010-0009) (remote check)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2010-035.NASL
    descriptionThis updates provides a new OpenOffice.org version 3.1.1. It holds security and bug fixes described as follow : An integer underflow might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow (CVE-2009-0200). A heap-based buffer overflow might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to table parsing (CVE-2009-0201). A heap-based buffer overflow allows remote attackers to execute arbitrary code via a crafted EMF file (CVE-2009-2139). Multiple heap-based buffer overflows allow remote attackers to execute arbitrary code via a crafted EMF+ file (CVE-2009-2140). OpenOffice
    last seen2020-06-01
    modified2020-06-02
    plugin id48172
    published2010-07-30
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/48172
    titleMandriva Linux Security Advisory : openoffice.org (MDVSA-2010:035)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-4352.NASL
    description - Thu Mar 11 2010 Lucian Langa <cooly at gnome.eu.org> - 1.2.8-4 - kill rpath - use system ltdl (#563975) - fix documents install - misc cleanups Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47358
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47358
    titleFedora 11 : hamlib-1.2.8-4.fc11 (2010-4352)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-4339.NASL
    descriptionRemove embedded ltdl to fix CVE-2009-3736 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47355
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47355
    titleFedora 12 : gnu-smalltalk-3.1-8.fc12 (2010-4339)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201412-08.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201412-08 (Multiple packages, Multiple vulnerabilities fixed in 2010) Vulnerabilities have been discovered in the packages listed below. Please review the CVE identifiers in the Reference section for details. Insight Perl Tk Module Source-Navigator Tk Partimage Mlmmj acl Xinit gzip ncompress liblzw splashutils GNU M4 KDE Display Manager GTK+ KGet dvipng Beanstalk Policy Mount pam_krb5 GNU gv LFTP Uzbl Slim Bitdefender Console iputils DVBStreamer Impact : A context-dependent attacker may be able to gain escalated privileges, execute arbitrary code, cause Denial of Service, obtain sensitive information, or otherwise bypass security restrictions. Workaround : There are no known workarounds at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id79961
    published2014-12-15
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79961
    titleGLSA-201412-08 : Multiple packages, Multiple vulnerabilities fixed in 2010
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2010-056.NASL
    descriptionThis update provides the OpenOffice.org 3.0 major version and holds the security fixes for the following issues : An integer underflow might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document leading to a heap-based buffer overflow (CVE-2009-0200). An heap-based buffer overflow might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document related to table parsing. (CVE-2009-0201). Multiple heap-based buffer overflows allow remote attackers to execute arbitrary code via a crafted EMF+ file (CVE-2009-2140). OpenOffice
    last seen2020-06-01
    modified2020-06-02
    plugin id44996
    published2010-03-08
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/44996
    titleMandriva Linux Security Advisory : openoffice.org (MDVSA-2010:056)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_LIBLTDL-3-091201.NASL
    descriptionlibtool: libltdl may load modules from the current working directory. CVE-2009-3736 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id43629
    published2010-01-05
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/43629
    titleopenSUSE Security Update : libltdl-3 (libltdl-3-1638)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2009-307.NASL
    descriptionA vulnerability was discovered and corrected in libtool : All versions of libtool prior to 2.2.6b suffers from a local privilege escalation vulnerability that could be exploited under certain conditions to load arbitrary code (CVE-2009-3736). This advisory fixes this issue. Additionally, all applications embedding the libtool code were patched in order to avoid possible future exploitations of this issue. Update : Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers
    last seen2020-06-01
    modified2020-06-02
    plugin id42943
    published2009-12-01
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/42943
    titleMandriva Linux Security Advisory : libtool (MDVSA-2009:307-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-4407.NASL
    description - Thu Mar 11 2010 Lucian Langa <cooly at gnome.eu.org> - 1.2.10-2 - kill rpath - misc cleanups - use system ltdl (#563975) - Sat Nov 7 2009 Lucian Langa <cooly at gnome.eu.org> - 1.2.10-1 - new upstream release Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47361
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47361
    titleFedora 12 : hamlib-1.2.10-2.fc12 (2010-4407)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1958.NASL
    descriptionIt was discovered that ltdl, a system-independent dlopen wrapper for GNU libtool, can be tricked to load and run modules from an arbitrary directory, which might be used to execute arbitrary code with the privileges of the user running an application that uses libltdl.
    last seen2020-06-01
    modified2020-06-02
    plugin id44823
    published2010-02-24
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/44823
    titleDebian DSA-1958-1 : libtool - privilege escalation
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2009-1646.NASL
    descriptionFrom Red Hat Security Advisory 2009:1646 : Updated libtool packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. GNU Libtool is a set of shell scripts which automatically configure UNIX, Linux, and similar operating systems to generically build shared libraries. A flaw was found in the way GNU Libtool
    last seen2020-06-01
    modified2020-06-02
    plugin id67968
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67968
    titleOracle Linux 3 / 4 / 5 : libtool (ELSA-2009-1646)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-3216.NASL
    descriptionThis update patches the bundled copy of libltdl library which was vulnerable to CVE-2009-3736. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47301
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47301
    titleFedora 12 : esorex-3.7.2-5.fc12 (2010-3216)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-4098.NASL
    descriptionThis update patches the bundled copy of libltdl library which was vulnerable to CVE-2009-3736. This update allows esorex to be built with the new ImplicitDSOLinking behaviour of F-13 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47338
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47338
    titleFedora 13 : esorex-3.7.2-6.fc13 (2010-4098)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-1872.NASL
    descriptionFix package so that it uses the system copy of libtool-ltdl, and get rid of the ancient embedded copy, which suffers from the vulnerability in CVE-2009-3736. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47280
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47280
    titleFedora 12 : gambas-1.0.19-12.fc12 (2010-1872)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2010-075.NASL
    descriptionThis updates provides a security update to the OpenOffice.org described as follow : OpenOffice
    last seen2020-06-01
    modified2020-06-02
    plugin id48178
    published2010-07-30
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/48178
    titleMandriva Linux Security Advisory : openoffice.org (MDVSA-2010:075)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-1924.NASL
    descriptionFix package so that it uses the system copy of libtool-ltdl, and get rid of the ancient embedded copy, which suffers from the vulnerability in CVE-2009-3736. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47283
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47283
    titleFedora 11 : gambas-1.0.19-12.fc11 (2010-1924)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_LIBTOOL-6683.NASL
    descriptionlibtool: libltdl may load modules from the current working directory. CVE-2009-3736 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id49884
    published2010-10-11
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49884
    titleSuSE 10 Security Update : libtool (ZYPP Patch Number 6683)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2010-0039.NASL
    descriptionUpdated gcc and gcc4 packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The gcc and gcc4 packages include, among others, C, C++, and Java GNU compilers and related support libraries. libgcj contains a copy of GNU Libtool
    last seen2020-06-01
    modified2020-06-02
    plugin id44027
    published2010-01-15
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/44027
    titleCentOS 3 / 4 / 5 : gcc / gcc4 (CESA-2010:0039)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-1820.NASL
    descriptionThis update makes Gnash use the system version of the libltdl library instead of the bundled copy which was vulnerable to CVE-2009-3736. An update to the system libltdl fixing CVE-2009-3736 was issued on December 29, 2009. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47273
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47273
    titleFedora 12 : gnash-0.8.6-13.fc12 (2010-1820)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-2341.NASL
    descriptionNot sure whether mingw32-libltdl (due to its special nature in being for cross- compilation development for an entirely different system) is actually affected by CVE-2009-3736, but this should make sure everything is fixed. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47290
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47290
    titleFedora 12 : mingw32-libltdl-1.5.26-20.fc12 (2010-2341)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-1958.NASL
    descriptionRebuilt against system libltdl. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id52538
    published2011-03-04
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/52538
    titleFedora 13 : q-7.11-8.fc13 (2011-1958)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2010-105.NASL
    descriptionThis updates provides a new OpenOffice.org version 3.1.1. It holds security and bug fixes described as follow : An integer underflow might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow (CVE-2009-0200). A heap-based buffer overflow might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to table parsing (CVE-2009-0201). A heap-based buffer overflow allows remote attackers to execute arbitrary code via a crafted EMF file (CVE-2009-2139). Multiple heap-based buffer overflows allow remote attackers to execute arbitrary code via a crafted EMF+ file (CVE-2009-2140). OpenOffice
    last seen2020-06-01
    modified2020-06-02
    plugin id46699
    published2010-05-24
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46699
    titleMandriva Linux Security Advisory : openoffice.org (MDVSA-2010:105)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20100113_GCC_AND_GCC4_ON_SL3_X.NASL
    descriptionCVE-2009-3736 libtool: libltdl may load and execute code from a library in the current directory A flaw was found in the way GNU Libtool
    last seen2020-06-01
    modified2020-06-02
    plugin id60722
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60722
    titleScientific Linux Security Update : gcc and gcc4 on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-1833.NASL
    descriptionThis update makes Gnash use the system version of the libltdl library instead of the bundled copy which was vulnerable to CVE-2009-3736. An update to the system libltdl fixing CVE-2009-3736 was issued on December 21, 2009. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47274
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47274
    titleFedora 11 : gnash-0.8.6-13.fc11 (2010-1833)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-4392.NASL
    descriptionRemove embedded ltdl to fix CVE-2009-3736 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47360
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47360
    titleFedora 11 : gnu-smalltalk-3.1-8.fc11 (2010-4392)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2009-12562.NASL
    descriptionlibltdl may load and execute code from a library in the current directory. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id43611
    published2009-12-30
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43611
    titleFedora 12 : libtool-2.2.6-17.fc12 (2009-12562)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-2943.NASL
    descriptionNot sure whether mingw32-libltdl (due to its special nature in being for cross- compilation development for an entirely different system) is actually affected by CVE-2009-3736, but this should make sure everything is fixed. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47296
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47296
    titleFedora 11 : mingw32-libltdl-1.5.26-17.fc11 (2010-2943)
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_12554.NASL
    descriptionlibltdl of libtool may load modules from the current working directory. CVE-2009-3736 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id44929
    published2010-03-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/44929
    titleSuSE9 Security Update : libtool (YOU Patch Number 12554)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-1967.NASL
    descriptionRebuilt against system libltdl. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id52539
    published2011-03-04
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/52539
    titleFedora 14 : q-7.11-8.fc14 (2011-1967)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-10640.NASL
    descriptionThe remote Fedora host is missing one or more security updates : gcc-4.4.4-10.fc12 : - Wed Jun 30 2010 Jakub Jelinek <jakub at redhat.com> 4.4.4-10 - update from gcc-4_4-branch - PRs fortran/43841, fortran/43843, tree-optimization/44683 - fix qualified-id as template argument handling (#605761, PR c++/44587) - -Wunused-but-set-* static_cast fix (PR c++/44682) - VTA backports - PRs debug/44610, debug/44668, debug/44694 - unswitching fixes (PR middle-end/43866) - Thu Jun 24 2010 Jakub Jelinek <jakub at redhat.com> 4.4.4-9 - update from gcc-4_4-branch - PRs bootstrap/44426, bootstrap/44544, c++/44627, fortran/44536, libgcj/44216, target/39690, target/43740, target/44261, target/44481, target/44534, target/44615, testsuite/32843, testsuite/43739, tree-optimization/44508 - VTA backports - PRs debug/43650, debug/44181, debug/44247 - -Wunused-but-set-* ->*/.* fix (PR c++/44619) - undeprecate #ident and #sccs (#606069) - fixup dates in generated man pages even for fastjar and gcc/ man pages - don
    last seen2020-06-01
    modified2020-06-02
    plugin id47612
    published2010-07-07
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47612
    titleFedora 12 : gcc-4.4.4-10.fc12 / libtool-2.2.6-18.fc12.1 (2010-10640)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_LIBTOOL-6678.NASL
    descriptionlibtool: libltdl may load modules from the current working directory. CVE-2009-3736 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id43634
    published2010-01-05
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/43634
    titleSuSE 10 Security Update : libtool (ZYPP Patch Number 6678)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-3314.NASL
    descriptionThis update patches the bundled copy of libltdl library which was vulnerable to CVE-2009-3736. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47307
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47307
    titleFedora 11 : esorex-3.7.2-3.fc11 (2010-3314)

Oval

  • accepted2013-04-29T04:15:19.827-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
      ovaloval:org.mitre.oval:def:11782
    • commentCentOS Linux 3.x
      ovaloval:org.mitre.oval:def:16651
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
      ovaloval:org.mitre.oval:def:11831
    • commentCentOS Linux 4.x
      ovaloval:org.mitre.oval:def:16636
    • commentOracle Linux 4.x
      ovaloval:org.mitre.oval:def:15990
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
      ovaloval:org.mitre.oval:def:11414
    • commentThe operating system installed on the system is CentOS Linux 5.x
      ovaloval:org.mitre.oval:def:15802
    • commentOracle Linux 5.x
      ovaloval:org.mitre.oval:def:15459
    descriptionltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
    familyunix
    idoval:org.mitre.oval:def:11687
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
    version28
  • accepted2014-01-20T04:01:30.438-05:00
    classvulnerability
    contributors
    • nameJ. Daniel Brown
      organizationDTCC
    • nameChris Coffin
      organizationThe MITRE Corporation
    definition_extensions
    commentVMware ESX Server 4.0 is installed
    ovaloval:org.mitre.oval:def:6293
    descriptionltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
    familyunix
    idoval:org.mitre.oval:def:6951
    statusaccepted
    submitted2010-06-01T17:30:00.000-05:00
    titleGNU Libtool 'libltdl' Library Search Path Local Privilege Escalation Vulnerability
    version9

Redhat

advisories
  • bugzilla
    id537941
    titleCVE-2009-3736 libtool: libltdl may load and execute code from a library in the current directory
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • commentlibtool-libs is earlier than 0:1.5.6-5.el4_8
            ovaloval:com.redhat.rhsa:tst:20091646001
          • commentlibtool-libs is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20091646002
        • AND
          • commentlibtool is earlier than 0:1.5.6-5.el4_8
            ovaloval:com.redhat.rhsa:tst:20091646003
          • commentlibtool is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20091646004
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentlibtool-ltdl-devel is earlier than 0:1.5.22-7.el5_4
            ovaloval:com.redhat.rhsa:tst:20091646006
          • commentlibtool-ltdl-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20091646007
        • AND
          • commentlibtool-ltdl is earlier than 0:1.5.22-7.el5_4
            ovaloval:com.redhat.rhsa:tst:20091646008
          • commentlibtool-ltdl is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20091646009
        • AND
          • commentlibtool is earlier than 0:1.5.22-7.el5_4
            ovaloval:com.redhat.rhsa:tst:20091646010
          • commentlibtool is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20091646011
    rhsa
    idRHSA-2009:1646
    released2009-12-08
    severityModerate
    titleRHSA-2009:1646: libtool security update (Moderate)
  • bugzilla
    id537941
    titleCVE-2009-3736 libtool: libltdl may load and execute code from a library in the current directory
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • commentlibgfortran is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039001
          • commentlibgfortran is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039002
        • AND
          • commentlibgcj4-src is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039003
          • commentlibgcj4-src is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039004
        • AND
          • commentgcc4-java is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039005
          • commentgcc4-java is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039006
        • AND
          • commentlibgcj4 is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039007
          • commentlibgcj4 is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039008
        • AND
          • commentlibgomp is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039009
          • commentlibgomp is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039010
        • AND
          • commentlibmudflap is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039011
          • commentlibmudflap is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039012
        • AND
          • commentgcc4-gfortran is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039013
          • commentgcc4-gfortran is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039014
        • AND
          • commentgcc4 is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039015
          • commentgcc4 is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039016
        • AND
          • commentlibmudflap-devel is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039017
          • commentlibmudflap-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039018
        • AND
          • commentgcc4-c++ is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039019
          • commentgcc4-c++ is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039020
        • AND
          • commentlibgcj4-devel is earlier than 0:4.1.2-44.EL4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039021
          • commentlibgcj4-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20100039022
        • AND
          • commentlibgcj-devel is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039023
          • commentlibgcj-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220022
        • AND
          • commentlibgnat is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039025
          • commentlibgnat is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220012
        • AND
          • commentgcc-gnat is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039027
          • commentgcc-gnat is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220006
        • AND
          • commentlibstdc++ is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039029
          • commentlibstdc++ is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220024
        • AND
          • commentlibobjc is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039031
          • commentlibobjc is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220008
        • AND
          • commentcpp is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039033
          • commentcpp is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220026
        • AND
          • commentgcc-objc is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039035
          • commentgcc-objc is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220018
        • AND
          • commentlibf2c is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039037
          • commentlibf2c is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220004
        • AND
          • commentgcc-java is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039039
          • commentgcc-java is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220016
        • AND
          • commentlibgcj is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039041
          • commentlibgcj is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220010
        • AND
          • commentgcc is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039043
          • commentgcc is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220020
        • AND
          • commentgcc-c++ is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039045
          • commentgcc-c++ is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220002
        • AND
          • commentgcc-g77 is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039047
          • commentgcc-g77 is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220030
        • AND
          • commentlibstdc++-devel is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039049
          • commentlibstdc++-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220014
        • AND
          • commentlibgcc is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039051
          • commentlibgcc is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220028
        • AND
          • commentgcc-c++-ppc32 is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039053
          • commentgcc-c++-ppc32 is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220032
        • AND
          • commentgcc-ppc32 is earlier than 0:3.4.6-11.el4_8.1
            ovaloval:com.redhat.rhsa:tst:20100039055
          • commentgcc-ppc32 is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070220034
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentlibstdc++-devel is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039058
          • commentlibstdc++-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039059
        • AND
          • commentlibstdc++ is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039060
          • commentlibstdc++ is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039061
        • AND
          • commentlibmudflap-devel is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039062
          • commentlibmudflap-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039063
        • AND
          • commentlibobjc is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039064
          • commentlibobjc is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039065
        • AND
          • commentlibgnat is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039066
          • commentlibgnat is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039067
        • AND
          • commentgcc-gnat is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039068
          • commentgcc-gnat is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039069
        • AND
          • commentgcc-objc++ is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039070
          • commentgcc-objc++ is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039071
        • AND
          • commentgcc-objc is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039072
          • commentgcc-objc is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039073
        • AND
          • commentgcc-java is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039074
          • commentgcc-java is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039075
        • AND
          • commentlibgcj is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039076
          • commentlibgcj is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039077
        • AND
          • commentcpp is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039078
          • commentcpp is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039079
        • AND
          • commentlibgcj-src is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039080
          • commentlibgcj-src is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039081
        • AND
          • commentlibmudflap is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039082
          • commentlibmudflap is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039083
        • AND
          • commentlibgcc is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039084
          • commentlibgcc is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039085
        • AND
          • commentlibgcj-devel is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039086
          • commentlibgcj-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039087
        • AND
          • commentgcc is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039088
          • commentgcc is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039089
        • AND
          • commentlibgfortran is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039090
          • commentlibgfortran is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039091
        • AND
          • commentgcc-c++ is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039092
          • commentgcc-c++ is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039093
        • AND
          • commentgcc-gfortran is earlier than 0:4.1.2-46.el5_4.2
            ovaloval:com.redhat.rhsa:tst:20100039094
          • commentgcc-gfortran is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100039095
    rhsa
    idRHSA-2010:0039
    released2010-01-13
    severityModerate
    titleRHSA-2010:0039: gcc and gcc4 security update (Moderate)
  • rhsa
    idRHSA-2010:0095
rpms
  • libtool-0:1.4.3-7
  • libtool-0:1.5.22-7.el5_4
  • libtool-0:1.5.6-5.el4_8
  • libtool-debuginfo-0:1.4.3-7
  • libtool-debuginfo-0:1.5.22-7.el5_4
  • libtool-debuginfo-0:1.5.6-5.el4_8
  • libtool-libs-0:1.4.3-7
  • libtool-libs-0:1.5.6-5.el4_8
  • libtool-ltdl-0:1.5.22-7.el5_4
  • libtool-ltdl-devel-0:1.5.22-7.el5_4
  • cpp-0:3.2.3-60
  • cpp-0:3.4.6-11.el4_8.1
  • cpp-0:4.1.2-46.el5_4.2
  • gcc-0:3.2.3-60
  • gcc-0:3.4.6-11.el4_8.1
  • gcc-0:4.1.2-46.el5_4.2
  • gcc-c++-0:3.2.3-60
  • gcc-c++-0:3.4.6-11.el4_8.1
  • gcc-c++-0:4.1.2-46.el5_4.2
  • gcc-c++-ppc32-0:3.2.3-60
  • gcc-c++-ppc32-0:3.4.6-11.el4_8.1
  • gcc-debuginfo-0:3.2.3-60
  • gcc-debuginfo-0:3.4.6-11.el4_8.1
  • gcc-debuginfo-0:4.1.2-46.el5_4.2
  • gcc-g77-0:3.2.3-60
  • gcc-g77-0:3.4.6-11.el4_8.1
  • gcc-gfortran-0:4.1.2-46.el5_4.2
  • gcc-gnat-0:3.2.3-60
  • gcc-gnat-0:3.4.6-11.el4_8.1
  • gcc-gnat-0:4.1.2-46.el5_4.2
  • gcc-java-0:3.2.3-60
  • gcc-java-0:3.4.6-11.el4_8.1
  • gcc-java-0:4.1.2-46.el5_4.2
  • gcc-objc++-0:4.1.2-46.el5_4.2
  • gcc-objc-0:3.2.3-60
  • gcc-objc-0:3.4.6-11.el4_8.1
  • gcc-objc-0:4.1.2-46.el5_4.2
  • gcc-ppc32-0:3.2.3-60
  • gcc-ppc32-0:3.4.6-11.el4_8.1
  • gcc4-0:4.1.2-44.EL4_8.1
  • gcc4-c++-0:4.1.2-44.EL4_8.1
  • gcc4-debuginfo-0:4.1.2-44.EL4_8.1
  • gcc4-gfortran-0:4.1.2-44.EL4_8.1
  • gcc4-java-0:4.1.2-44.EL4_8.1
  • libf2c-0:3.2.3-60
  • libf2c-0:3.4.6-11.el4_8.1
  • libgcc-0:3.2.3-60
  • libgcc-0:3.4.6-11.el4_8.1
  • libgcc-0:4.1.2-46.el5_4.2
  • libgcj-0:3.2.3-60
  • libgcj-0:3.4.6-11.el4_8.1
  • libgcj-0:4.1.2-46.el5_4.2
  • libgcj-devel-0:3.2.3-60
  • libgcj-devel-0:3.4.6-11.el4_8.1
  • libgcj-devel-0:4.1.2-46.el5_4.2
  • libgcj-src-0:4.1.2-46.el5_4.2
  • libgcj4-0:4.1.2-44.EL4_8.1
  • libgcj4-devel-0:4.1.2-44.EL4_8.1
  • libgcj4-src-0:4.1.2-44.EL4_8.1
  • libgfortran-0:4.1.2-44.EL4_8.1
  • libgfortran-0:4.1.2-46.el5_4.2
  • libgnat-0:3.2.3-60
  • libgnat-0:3.4.6-11.el4_8.1
  • libgnat-0:4.1.2-46.el5_4.2
  • libgomp-0:4.1.2-44.EL4_8.1
  • libmudflap-0:4.1.2-44.EL4_8.1
  • libmudflap-0:4.1.2-46.el5_4.2
  • libmudflap-devel-0:4.1.2-44.EL4_8.1
  • libmudflap-devel-0:4.1.2-46.el5_4.2
  • libobjc-0:3.2.3-60
  • libobjc-0:3.4.6-11.el4_8.1
  • libobjc-0:4.1.2-46.el5_4.2
  • libstdc++-0:3.2.3-60
  • libstdc++-0:3.4.6-11.el4_8.1
  • libstdc++-0:4.1.2-46.el5_4.2
  • libstdc++-devel-0:3.2.3-60
  • libstdc++-devel-0:3.4.6-11.el4_8.1
  • libstdc++-devel-0:4.1.2-46.el5_4.2

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 37128 CVE ID: CVE-2009-3736 GNU libtool是一个通用库支持脚本,将使用动态库的复杂性隐藏在统一、可移植的接口中。 GNU Libtool的libltdl库中的ltdl.c文件将当前工作目录用作了库的搜索路径,如果攻击者创建了恶意的共享对象或.la文件并诱骗用户使用同一目录中的libtool库执行应用程序,就会导致执行任意代码。 GNU libtool 2.2.6 GNU libtool 1.5.x 厂商补丁: GNU --- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://lists.gnu.org/archive/html/libtool/2009-11/msg00059.html
idSSV:15008
last seen2017-11-19
modified2009-12-02
published2009-12-02
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-15008
titleGNU Libtool libltdl库搜索路径本地权限提升漏洞

References