Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gmh7-j6pc-xmxr

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.

Ссылки

EPSS

Процентиль: 42%
0.00197
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.

redhat
почти 14 лет назад

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.

nvd
больше 13 лет назад

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.

msrc
4 месяца назад

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.

debian
больше 13 лет назад

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 place ...

EPSS

Процентиль: 42%
0.00197
Низкий