{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T19:19:19.099","vulnerabilities":[{"cve":{"id":"CVE-2025-4802","sourceIdentifier":"3ff69d7a-14f2-4f67-a097-88dee7810d18","published":"2025-05-16T20:15:22.280","lastModified":"2025-11-03T20:19:11.153","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo)."},{"lang":"es","value":"La vulnerabilidad de la variable de entorno no confiable LD_LIBRARY_PATH en GNU C Library versión 2.27 a 2.38 permite al atacante cargar, controlada por un atacante, una librería compartida dinámicamente en binarios setuid compilados estáticamente que llaman a dlopen (incluidas las llamadas internas a dlopen después de setlocale o las llamadas a funciones NSS como getaddrinfo)."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"3ff69d7a-14f2-4f67-a097-88dee7810d18","type":"Secondary","description":[{"lang":"en","value":"CWE-426"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","versionStartIncluding":"2.27","versionEndIncluding":"2.38","matchCriteriaId":"29CCC9F6-2130-4DA8-8B5D-7A00337CBC0A"}]}]}],"references":[{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32976","source":"3ff69d7a-14f2-4f67-a097-88dee7810d18","tags":["Issue Tracking"]},{"url":"https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e","source":"3ff69d7a-14f2-4f67-a097-88dee7810d18","tags":["Patch"]},{"url":"http://www.openwall.com/lists/oss-security/2025/05/16/7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"http://www.openwall.com/lists/oss-security/2025/05/17/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00033.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}