Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2006-4842

Опубликовано: 05 сент. 2006
Источник: redhat

Описание

The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.

Отчет

This issue also affects other OS that use NSPR. However, Red Hat does not ship any application linked setuid or setgid against NSPR and therefore is not vulnerable to this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4nsprNot affected
Red Hat Enterprise Linux 5nsprNot affected
Red Hat Enterprise Linux 6nsprNot affected
Red Hat Enterprise Linux 7nsprNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-270
https://bugzilla.redhat.com/show_bug.cgi?id=1253692nspr: setuid root programs linked with NSPR allow elevation of privilege

Связанные уязвимости

ubuntu
почти 19 лет назад

The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.

nvd
почти 19 лет назад

The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.

debian
почти 19 лет назад

The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in S ...

github
больше 3 лет назад

The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.