Логотип exploitDog
bind:CVE-2005-2072
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-2072

Количество 2

Количество 2

nvd логотип

CVE-2005-2072

около 20 лет назад

The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-xvp7-pvpj-c69f

больше 3 лет назад

The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2005-2072

The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.

CVSS2: 7.2
0%
Низкий
около 20 лет назад
github логотип
GHSA-xvp7-pvpj-c69f

The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу