Vulnerabilities > CVE-2005-3582 - Packages Insecure RUNPATH vulnerability in Gentoo Linux

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
imagemagick
nessus

Summary

ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.

Vulnerable Configurations

Part Description Count
Application
Imagemagick
58

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200511-02.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200511-02 (QDBM, ImageMagick, GDAL: RUNPATH issues) Some packages may introduce insecure paths into the list of directories that are searched for libraries at runtime. Furthermore, packages depending on the MakeMaker Perl module for build configuration may have incorrectly copied the LD_RUN_PATH into the DT_RPATH. Impact : A local attacker, who is a member of the
last seen2020-06-01
modified2020-06-02
plugin id20142
published2005-11-04
reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20142
titleGLSA-200511-02 : QDBM, ImageMagick, GDAL: RUNPATH issues

Statements

contributorMark J Cox
lastmodified2006-08-16
organizationRed Hat
statementNot vulnerable. This issue is caused by the way ImageMagick was packaged by Gentoo and does not affect Red Hat Enterprise Linux packages.