misc.cpp in KPopup 0.9.1 trusts the PATH variable when executing killall, which allows local users to elevate their privileges by modifying the PATH variable to reference a malicious killall program.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/10105 - Patch | |
References | () http://www.osvdb.org/2742 - Patch | |
References | () http://www.securityfocus.com/archive/1/342736 - Exploit | |
References | () http://www.securityfocus.com/bid/8915 - Exploit, Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/13540 - |
Information
Published : 2003-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-1167
Mitre link : CVE-2003-1167
CVE.ORG link : CVE-2003-1167
JSON object : View
Products Affected
gernot_stocker
- kpopup
CWE