Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0415

Опубликовано: 29 янв. 2009
Источник: redhat
EPSS Низкий

Описание

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=484065trickle: Possibility to load arbitrary code from current working directory

EPSS

Процентиль: 24%
0.00083
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

nvd
около 17 лет назад

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

debian
около 17 лет назад

Untrusted search path vulnerability in trickle 1.07 allows local users ...

github
почти 4 года назад

Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.

EPSS

Процентиль: 24%
0.00083
Низкий