Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-4865

Опубликовано: 01 нояб. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.2

Описание

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

not-affected

1:3.4.1-1ubuntu1
karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

Показывать по

Ссылки на источники

EPSS

Процентиль: 35%
0.00139
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

nvd
почти 17 лет назад

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

debian
почти 17 лет назад

Untrusted search path vulnerability in valgrind before 3.4.0 allows lo ...

github
больше 3 лет назад

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

EPSS

Процентиль: 35%
0.00139
Низкий

7.2 High

CVSS2