Vulnerabilities > CVE-2005-4442 - Packages Insecure RUNPATH vulnerability in Gentoo Linux
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Vulnerable Configurations
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200512-07.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200512-07 (OpenLDAP, Gauche: RUNPATH issues) Gentoo packaging for OpenLDAP and Gauche may introduce insecure paths into the list of directories that are searched for libraries at runtime. Impact : A local attacker, who is a member of the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20327 |
published | 2005-12-20 |
reporter | This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20327 |
title | GLSA-200512-07 : OpenLDAP, Gauche: RUNPATH issues |
Statements
contributor | Mark J Cox |
lastmodified | 2006-08-30 |
organization | Red Hat |
statement | This issue did not affect the versions of OpenLDAP as distributed with Red Hat Enterprise Linux 2.1, 3, or 4. |