Vulnerability Name: | CVE-2006-0646 (CCN-25333) | ||||||||
Assigned: | 2006-02-10 | ||||||||
Published: | 2006-02-10 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. | ||||||||
CVSS v3 Severity: | 4.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2006-0646 Source: SUSE Type: Patch, Vendor Advisory SUSE-SA:2006:007 Source: CCN Type: SA18811 SUSE ld Insecure RPATH Privilege Escalation Source: SECUNIA Type: UNKNOWN 18811 Source: CCN Type: OSVDB ID: 23111 SUSE Linux ld RPATH Variable Subversion Privilege Escalation Source: BID Type: UNKNOWN 16581 Source: CCN Type: BID-16581 SUSE LD Insecure RPATH / RUNPATH Arbitrary Code Execution Vulnerability Source: XF Type: UNKNOWN suse-ld-code-execution(25333) Source: SUSE Type: SUSE-SA:2006:007 binutils local privilege escalation | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |