Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-4005

Опубликовано: 06 нояб. 2010
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.9

Описание

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1.15.4-0ubuntu1
cosmic

not-affected

1.15.4-0ubuntu1
dapper

ignored

end of life
devel

not-affected

1.15.4-0ubuntu1
esm-apps/bionic

not-affected

1.15.4-0ubuntu1
esm-apps/xenial

not-affected

1.15.4-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1.15.4-0ubuntu1]]
hardy

ignored

end of life
karmic

ignored

end of life

Показывать по

Ссылки на источники

EPSS

Процентиль: 30%
0.00112
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

nvd
больше 15 лет назад

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.

debian
больше 15 лет назад

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and ...

github
больше 3 лет назад

The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.

EPSS

Процентиль: 30%
0.00112
Низкий

6.9 Medium

CVSS2