CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2005-4790

Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam. NOTE: in August 2007, the tomboy vector was reported for other distributions.
Publish Date : 2005-12-31 Last Update Date : 2010-11-11
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
6.9
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Execute Code
CWE ID CWE id is not defined for this vulnerability

- Products Affected By CVE-2005-4790

# Product Type Vendor Product Version Update Edition Language
1 OS Suse Suse Linux 9.3 Version Details Vulnerabilities
2 OS Suse Suse Linux 10.0 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Suse Suse Linux 2

- References For CVE-2005-4790

http://osvdb.org/39578
OSVDB 39578
http://osvdb.org/39577
OSVDB 39577
http://bugs.gentoo.org/show_bug.cgi?id=199841 CONFIRM
http://bugs.gentoo.org/show_bug.cgi?id=189249 CONFIRM
http://bugs.gentoo.org/show_bug.cgi?id=188806
http://secunia.com/advisories/27608
SECUNIA 27608
http://secunia.com/advisories/26480
SECUNIA 26480
http://secunia.com/advisories/27799
SECUNIA 27799
http://secunia.com/advisories/27621
SECUNIA 27621
http://secunia.com/advisories/28339
SECUNIA 28339
http://secunia.com/advisories/28672
SECUNIA 28672
http://www.novell.com/linux/security/advisories/2005_22_sr.html
SUSE SUSE-SR:2005:022
http://www.mandriva.com/security/advisories?name=MDVSA-2008:064
MANDRIVA MDVSA-2008:064
http://security.gentoo.org/glsa/glsa-200801-14.xml
GENTOO GLSA-200801-14
http://security.gentoo.org/glsa/glsa-200711-12.xml
GENTOO GLSA-200711-12
http://www.ubuntulinux.org/support/documentation/usn/usn-560-1
UBUNTU USN-560-1
http://www.securityfocus.com/bid/25341
BID 25341 Tomboy LD_LIBRARY_PATH Environment Variable Local Privilege Escalation Vulnerability Release Date:2008-03-07
http://xforce.iss.net/xforce/xfdb/36054
XF tomboy-ldlibrarypath-privilege-escalation(36054)
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00913.html
FEDORA FEDORA-2007-3792
https://bugzilla.gnome.org/show_bug.cgi?id=485224 CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=362941 CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00206.html
FEDORA FEDORA-2007-3011

- Metasploit Modules Related To CVE-2005-4790

There are not any metasploit modules related to this vulnerability (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.