CVE-2009-3736

N/A Unknown
Published: November 29, 2009 Modified: April 23, 2026
View on NVD

Description

ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/37414
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/37489
Source: cret@cert.org
Vendor Advisory
http://www.securityfocus.com/bid/37128
Source: cret@cert.org
Patch
ftp://ftp.gnu.org/gnu/libtool/libtool-2.2.6a-2.2.6b.diff.gz
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Source: af854a3a-2127-422b-91ae-364da2661108
http://lists.gnu.org/archive/html/libtool/2009-11/msg00059.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://lists.gnu.org/archive/html/libtool/2009-11/msg00065.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://secunia.com/advisories/37414
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37489
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37997
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38190
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38577
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38617
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38696
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38915
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39299
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39347
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/43617
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/55721
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-201311-10.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/css/P8/documents/100074869
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:307
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2010:035
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2010:091
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2010:105
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2010-0039.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/37128
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vupen.com/english/advisories/2011/0574
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=537941
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source: af854a3a-2127-422b-91ae-364da2661108

76 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
31th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

gnu