Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r6fr-m835-g4g9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.

The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.

EPSS

Процентиль: 16%
0.00051
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.

nvd
больше 15 лет назад

The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.

debian
больше 15 лет назад

The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlie ...

EPSS

Процентиль: 16%
0.00051
Низкий