CVE-2005-4442

Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*
cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*

History

21 Nov 2024, 00:04

Type Values Removed Values Added
References () http://secunia.com/advisories/18040/ - Vendor Advisory () http://secunia.com/advisories/18040/ - Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml - Patch () http://www.gentoo.org/security/en/glsa/glsa-200512-07.xml - Patch
References () http://www.securityfocus.com/bid/15120 - Patch () http://www.securityfocus.com/bid/15120 - Patch

Information

Published : 2005-12-21 02:03

Updated : 2024-11-21 00:04


NVD link : CVE-2005-4442

Mitre link : CVE-2005-4442

CVE.ORG link : CVE-2005-4442


JSON object : View

Products Affected

openldap

  • openldap