CVE-2010-3998

The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:banshee-project:banshee:*:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:0.13.2:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.0:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.2:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.4:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:banshee-project:banshee:1.7.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://download.banshee.fm/banshee/unstable/1.9.0/banshee-1-1.9.0.news - () http://download.banshee.fm/banshee/unstable/1.9.0/banshee-1-1.9.0.news -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050744.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050744.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050747.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050747.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050756.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050756.html -
References () http://secunia.com/advisories/42234 - () http://secunia.com/advisories/42234 -
References () http://secunia.com/advisories/42237 - () http://secunia.com/advisories/42237 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:034 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:034 -
References () http://www.securityfocus.com/bid/44752 - () http://www.securityfocus.com/bid/44752 -
References () http://www.vupen.com/english/advisories/2010/2964 - () http://www.vupen.com/english/advisories/2010/2964 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=644554 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=644554 - Exploit

Information

Published : 2010-11-06 00:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-3998

Mitre link : CVE-2010-3998

CVE.ORG link : CVE-2010-3998


JSON object : View

Products Affected

banshee-project

  • banshee