CVE-2005-4532
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/12/2005
Last modified:
20/07/2017
Description
scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:scponly:scponly:3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:3.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:3.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/18223
- http://secunia.com/advisories/18236
- http://secunia.com/advisories/18829
- http://sublimation.org/scponly/#relnotes
- http://www.debian.org/security/2006/dsa-969
- http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml
- http://www.securityfocus.com/bid/16051
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23874