Vulnerabilities > CVE-2005-4279 - Packages Insecure RUNPATH vulnerability in Gentoo Qt-Unixodbc 3.3.3

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
gentoo
nessus

Summary

Untrusted search path vulnerability in Qt-UnixODBC before 3.3.4-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.

Vulnerable Configurations

Part Description Count
Application
Gentoo
2

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200510-14.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200510-14 (Perl, Qt-UnixODBC, CMake: RUNPATH issues) Some packages may introduce insecure paths into the list of directories that are searched for libraries at runtime. Furthermore, packages depending on the MakeMaker Perl module for build configuration may have incorrectly copied the LD_RUN_PATH into the DT_RPATH. Impact : A local attacker, who is a member of the
last seen2020-06-01
modified2020-06-02
plugin id20034
published2005-10-19
reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20034
titleGLSA-200510-14 : Perl, Qt-UnixODBC, CMake: RUNPATH issues