Vulnerability Name: | CVE-2005-3346 (CCN-23091) | ||||||||
Assigned: | 2005-11-10 | ||||||||
Published: | 2005-11-10 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form "$VAR/EVAR=arg", which cause the EVAR portion to be appended to a buffer returned by a getenv function call. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: Debian Bug report logs - #338312 - Original Advisory osh: Environment Variable Input Validation Bug Source: CONFIRM Type: UNKNOWN http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312 Source: MITRE Type: CNA CVE-2005-3346 Source: CCN Type: Osh Web site osh - What is osh Source: MISC Type: UNKNOWN http://pulltheplug.org/users/core/files/x_osh3.sh Source: CCN Type: SA17527 osh Environment Variable Substitution Vulnerability Source: SECUNIA Type: Vendor Advisory 17527 Source: SECUNIA Type: UNKNOWN 17967 Source: DEBIAN Type: UNKNOWN DSA-918 Source: DEBIAN Type: DSA-918 osh -- programming error Source: OSVDB Type: UNKNOWN 20720 Source: CCN Type: OSVDB ID: 20720 Operator Shell (osh) main.c Environment Variable Substitution Local Privilege Escalation Source: BID Type: UNKNOWN 15370 Source: CCN Type: BID-15370 Mike Neuman OSH Environment Variable Buffer Overflow Vulnerability Source: VUPEN Type: UNKNOWN ADV-2005-2378 Source: XF Type: UNKNOWN osh-main-execute-code(23091) Source: XF Type: UNKNOWN osh-main-execute-code(23091) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |