Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wqwx-hhf2-x4q9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.

EPSS

Процентиль: 30%
0.00112
Низкий

Дефекты

CWE-94

Связанные уязвимости

ubuntu
больше 15 лет назад

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.

nvd
больше 15 лет назад

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.

debian
больше 15 лет назад

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and ...

EPSS

Процентиль: 30%
0.00112
Низкий

Дефекты

CWE-94