Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-4865

Опубликовано: 01 нояб. 2008
Источник: ubuntu
Приоритет: low
CVSS2: 7.2

Описание

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

not-affected

1:3.4.1-1ubuntu1
karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

Показывать по

Ссылки на источники

7.2 High

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

nvd
больше 17 лет назад

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

debian
больше 17 лет назад

Untrusted search path vulnerability in valgrind before 3.4.0 allows lo ...

github
больше 3 лет назад

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

7.2 High

CVSS2