Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3383

Опубликовано: 20 окт. 2010
Источник: debian

Описание

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
teamspeak-clientfixed2.0.32-3.1package
teamspeak-clientno-dsalennypackage
teamspeak-serverfixed2.0.24.1+debian-1.1package
teamspeak-serverno-dsalennypackage

Связанные уязвимости

ubuntu
больше 15 лет назад

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

nvd
больше 15 лет назад

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

github
больше 3 лет назад

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.