The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable.  NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:02
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://osvdb.org/show/osvdb/107710 - | |
| References | () http://packetstormsecurity.com/files/134484/Chkrootkit-Local-Privilege-Escalation.html - | |
| References | () http://www.chkrootkit.org/ - Vendor Advisory | |
| References | () http://www.debian.org/security/2014/dsa-2945 - | |
| References | () http://www.openwall.com/lists/oss-security/2014/06/04/9 - Exploit | |
| References | () http://www.ubuntu.com/usn/USN-2230-1 - | |
| References | () https://security.gentoo.org/glsa/201709-05 - | |
| References | () https://www.exploit-db.com/exploits/38775/ - | 
Information
                Published : 2014-10-25 22:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-0476
Mitre link : CVE-2014-0476
CVE.ORG link : CVE-2014-0476
JSON object : View
Products Affected
                canonical
- ubuntu_linux
chkrootkit
- chkrootkit
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
