Vulnerabilities > CVE-2006-1296 - Unspecified vulnerability in Beagle-Project Beagle 0.2.2.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Untrusted search path vulnerability in Beagle 0.2.2.1 might allow local users to gain privileges via a malicious beagle-info program in the current working directory, or possibly directories specified in the PATH.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2006-188.NASL |
description | Some of the wrapper scripts (including beagle-status) looked in the current directory for files with a specific name and ran that instead of the binary in the path. All such cases have been fixed in this release. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21122 |
published | 2006-03-23 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21122 |
title | Fedora Core 5 : beagle-0.2.3-4 (2006-188) |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357392
- http://secunia.com/advisories/19278
- http://secunia.com/advisories/19336
- http://www.osvdb.org/23942
- http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00047.html
- http://www.securityfocus.com/bid/17195
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25303