Описание
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2001-1375
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=28226
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409
- http://www.iss.net/security_center/static/6869.php
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:060
- http://www.redhat.com/support/errata/RHSA-2002-148.html
- http://www.securityfocus.com/bid/3073
EPSS
CVE ID
Связанные уязвимости
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
Уязвимости операционной системы Red Hat Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимости операционной системы Red Hat Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимости операционной системы Red Hat Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS