The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: Banshee might also be affected using GST_PLUGIN_PATH.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://download.banshee.fm/banshee/unstable/1.9.0/banshee-1-1.9.0.news - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050744.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050747.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050756.html - | |
References | () http://secunia.com/advisories/42234 - | |
References | () http://secunia.com/advisories/42237 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:034 - | |
References | () http://www.securityfocus.com/bid/44752 - | |
References | () http://www.vupen.com/english/advisories/2010/2964 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=644554 - Exploit |
Information
Published : 2010-11-06 00:00
Updated : 2024-11-21 01:20
NVD link : CVE-2010-3998
Mitre link : CVE-2010-3998
CVE.ORG link : CVE-2010-3998
JSON object : View
Products Affected
banshee-project
- banshee
CWE