Vulnerabilities > CVE-2005-3346 - Unspecified vulnerability in OSH 1.7.14
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form "$VAR/EVAR=arg", which cause the EVAR portion to be appended to a buffer returned by a getenv function call.
Exploit-Db
description | Operator Shell (osh) 1.7-14 Local Root Exploit. CVE-2005-3346. Local exploit for linux platform |
id | EDB-ID:1300 |
last seen | 2016-01-31 |
modified | 2005-11-09 |
published | 2005-11-09 |
reporter | Charles Stevenson |
source | https://www.exploit-db.com/download/1300/ |
title | Operator Shell osh 1.7-14 - Local Root Exploit |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-918.NASL |
description | Several security related problems have been discovered in osh, the operator |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22784 |
published | 2006-10-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22784 |
title | Debian DSA-918-1 : osh - programming error |
code |
|
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312
- http://pulltheplug.org/users/core/files/x_osh3.sh
- http://pulltheplug.org/users/core/files/x_osh3.sh
- http://secunia.com/advisories/17527
- http://secunia.com/advisories/17527
- http://secunia.com/advisories/17967
- http://secunia.com/advisories/17967
- http://www.debian.org/security/2005/dsa-918
- http://www.debian.org/security/2005/dsa-918
- http://www.osvdb.org/20720
- http://www.osvdb.org/20720
- http://www.securityfocus.com/bid/15370
- http://www.securityfocus.com/bid/15370
- http://www.vupen.com/english/advisories/2005/2378
- http://www.vupen.com/english/advisories/2005/2378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23091
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23091