Vulnerabilities > CVE-2005-4442 - Packages Insecure RUNPATH vulnerability in Gentoo Linux

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
openldap
nessus

Summary

Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.

Vulnerable Configurations

Part Description Count
Application
Openldap
83

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200512-07.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200512-07 (OpenLDAP, Gauche: RUNPATH issues) Gentoo packaging for OpenLDAP and Gauche may introduce insecure paths into the list of directories that are searched for libraries at runtime. Impact : A local attacker, who is a member of the
last seen2020-06-01
modified2020-06-02
plugin id20327
published2005-12-20
reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20327
titleGLSA-200512-07 : OpenLDAP, Gauche: RUNPATH issues

Statements

contributorMark J Cox
lastmodified2006-08-30
organizationRed Hat
statementThis issue did not affect the versions of OpenLDAP as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.