Security features bypass in Glibc - CVE-2015-8777

 

Security features bypass in Glibc - CVE-2015-8777

Published: January 5, 2018 / Updated: June 3, 2025


Vulnerability identifier: #VU110105
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-8777
CWE-ID: CWE-254
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: GNU
Affected software:
Glibc

Detailed vulnerability description

The vulnerability allows a local user to manipulate data.

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.


How to mitigate CVE-2015-8777

Install update from vendor's website.

Sources