Vulnerability Name: | CVE-2006-1565 (CCN-25681) | ||||||||
Assigned: | 2006-03-27 | ||||||||
Published: | 2006-03-27 | ||||||||
Updated: | 2017-07-20 | ||||||||
Summary: | Untrusted search path vulnerability in libgpib-perl 3.2.06-2 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the LinuxGpib.so module, which might allow local users to gain privileges by installing malicious libraries in that directory. | ||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: Debian Bug report logs - #359239 libgpib-perl: LinuxGpib.so has trapdoor rpath /tmp/buildd/... Source: MISC Type: Exploit, Patch http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359239 Source: MITRE Type: CNA CVE-2006-1565 Source: CCN Type: OSVDB ID: 30355 Linux libgpib-perl Path Subversion Local Privilege Escalation Source: BID Type: Exploit, Patch 17288 Source: CCN Type: BID-17288 Debian GNU/Linux Multiple Packages Insecure RUNPATH Vulnerability Source: XF Type: UNKNOWN libgpib-perl-buildd-file-upload(25681) Source: XF Type: UNKNOWN libgpib-perl-buildd-file-upload(25681) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |