Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.
References
Configurations
History
21 Nov 2024, 00:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513456 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2009/01/29/5 - | |
References | () http://www.securityfocus.com/bid/33516 - |
Information
Published : 2009-02-03 23:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-0415
Mitre link : CVE-2009-0415
CVE.ORG link : CVE-2009-0415
JSON object : View
Products Affected
monkey
- trickle
CWE