Описание
The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.
The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-3998
- https://bugzilla.redhat.com/show_bug.cgi?id=644554
- http://download.banshee.fm/banshee/unstable/1.9.0/banshee-1-1.9.0.news
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050744.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050747.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050756.html
- http://secunia.com/advisories/42234
- http://secunia.com/advisories/42237
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:034
- http://www.securityfocus.com/bid/44752
- http://www.vupen.com/english/advisories/2010/2964
EPSS
CVE ID
Связанные уязвимости
The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.
The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.
The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlie ...
EPSS