Vulnerabilities > CVE-2008-4394 - Local Privilege Escalation vulnerability in Gentoo 'sys-apps/portage' Search Path
Attack vector
LOCAL Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200810-02.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200810-02 (Portage: Untrusted search path local root vulnerability) The Gentoo Security Team discovered that several ebuilds, such as sys-apps/portage, net-mail/fetchmail or app-editors/leo execute Python code using |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 34383 |
published | 2008-10-10 |
reporter | This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/34383 |
title | GLSA-200810-02 : Portage: Untrusted search path local root vulnerability |
code |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 31670 CVE ID:CVE-2008-4394 CNCVE ID:CNCVE-20084394 Gentoo是一款基于Linux的发行版本。 当Emerge使用eapi-2搜索查找ebuilds时EAPI-2没有正确处理,可导致以超级用户权限执行任意代码。 攻击者可以利用漏洞诱使管理员在部分Ebuilds上运行emerge命令。 Gentoo sys-apps/portage 2.1.4.4 Gentoo sys-apps/portage 2.1.3.11 Gentoo sys-apps/portage 2.1.3.10 可联系供应商获得最新补丁: <a href=http://bugs.gentoo.org/show_bug.cgi?id=240640 target=_blank>http://bugs.gentoo.org/show_bug.cgi?id=240640</a> |
id | SSV:4196 |
last seen | 2017-11-19 |
modified | 2008-10-13 |
published | 2008-10-13 |
reporter | Root |
title | Gentoo 'sys-apps/portage'搜索路径本地特权提升漏洞 |