Vulnerability Name:

CVE-2000-1163 (CCN-5564)

Assigned:2000-11-22
Published:2000-11-22
Updated:2017-10-10
Summary:ghostscript before 5.10-16 uses an empty LD_RUN_PATH environmental variable to find libraries in the current directory, which could allow local users to execute commands as other users by placing a Trojan horse library into a directory from which another user executes ghostscript.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2000-041.0
Two security problems with ghostscript

Source: CCN
Type: Conectiva Linux Announcement CLSA-2000:355
ghostscript: Temporary files and dynamic libraries

Source: CCN
Type: Immunix OS Security Advisory IMNX-2000-70-010-01
ghostscript

Source: MITRE
Type: CNA
CVE-2000-1163

Source: CONECTIVA
Type: UNKNOWN
CLSA-2000:343

Source: CCN
Type: Conectiva Linux Announcement CLSA-2000:343
ghostscript: Temporary files and dynamic libraries

Source: CALDERA
Type: UNKNOWN
CSSA-2000-041

Source: DEBIAN
Type: Patch, Vendor Advisory
20001123 ghostscript: symlink attack

Source: DEBIAN
Type: Debian Security Advisory 20001123
ghostscript: symlink attack

Source: CCN
Type: US-CERT VU#704976
Aladdin Ghostscript LD_RUN_PATH environment variable allows libraries to be loaded from current directory

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2000:074

Source: CCN
Type: OSVDB ID: 1662
Aladdin Ghostscript LD_RUN_PATH Variable Arbitrary Library Injection

Source: BID
Type: Patch, Vendor Advisory
1991

Source: CCN
Type: BID-1991
Aladdin Ghostscript Arbitrary Shared Library Usage Vulnerability

Source: CCN
Type: MandrakeSoft Security Advisory MDKSA-2000:074
ghostscript

Source: XF
Type: UNKNOWN
ghostscript-env-variable(5564)

Source: XF
Type: UNKNOWN
ghostscript-env-variable(5564)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:aladdin_enterprises:ghostscript:4.3:*:*:*:*:*:*:*
  • OR cpe:/a:aladdin_enterprises:ghostscript:5.10.10:*:*:*:*:*:*:*
  • OR cpe:/a:aladdin_enterprises:ghostscript:5.10.15:*:*:*:*:*:*:*
  • OR cpe:/a:aladdin_enterprises:ghostscript:5.10cl:*:*:*:*:*:*:*
  • OR cpe:/a:aladdin_enterprises:ghostscript:5.50:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:artifex:ghostscript:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    aladdin_enterprises ghostscript 4.3
    aladdin_enterprises ghostscript 5.10.10
    aladdin_enterprises ghostscript 5.10.15
    aladdin_enterprises ghostscript 5.10cl
    aladdin_enterprises ghostscript 5.50
    artifex ghostscript *
    redhat linux 7
    redhat linux 7.1
    redhat linux 7.2
    redhat linux 7.3