Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-3377

Опубликовано: 20 окт. 2010
Источник: ubuntu
Приоритет: low
CVSS2: 6.9

Описание

The (1) runSalome, (2) runTestMedCorba, (3) runLightSalome, and (4) hxx2salome scripts in SALOME 5.1.3 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

ignored

end of life
natty

ignored

end of life
oneiric

DNE

precise

DNE

Показывать по

Ссылки на источники

6.9 Medium

CVSS2

Связанные уязвимости

nvd
около 15 лет назад

The (1) runSalome, (2) runTestMedCorba, (3) runLightSalome, and (4) hxx2salome scripts in SALOME 5.1.3 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

debian
около 15 лет назад

The (1) runSalome, (2) runTestMedCorba, (3) runLightSalome, and (4) hx ...

github
больше 3 лет назад

The (1) runSalome, (2) runTestMedCorba, (3) runLightSalome, and (4) hxx2salome scripts in SALOME 5.1.3 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

6.9 Medium

CVSS2

Уязвимость CVE-2010-3377