Vulnerability Name: | CVE-1999-1422 (CCN-7561) | ||||||||
Assigned: | 1999-01-02 | ||||||||
Published: | 1999-01-02 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Sat, 2 Jan 1999 12:36:28 -0800 PATH variable in zip-slackware 2.0.35 Source: MITRE Type: CNA CVE-1999-1422 Source: BUGTRAQ Type: UNKNOWN 19990102 PATH variable in zip-slackware 2.0.35 Source: CCN Type: OSVDB ID: 13513 Slackware Linux Default PATH Subversion Privilege Escalation Source: BID Type: UNKNOWN 211 Source: CCN Type: BID-211 Slackware PATH variable Vulnerability Source: XF Type: UNKNOWN linux-path-execute-commands(7561) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |