Vulnerability Details : CVE-2008-4865
Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.
Products affected by CVE-2008-4865
- cpe:2.3:a:valgrind:valgrind:*:rc1:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.4.1:*:powerpc:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:1.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.0:rc3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4865
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4865
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
Vendor statements for CVE-2008-4865
-
Red Hat 2009-02-05Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-4865 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
References for CVE-2008-4865
-
http://www.openwall.com/lists/oss-security/2008/10/27/4
oss-security - Re: CVE request: lynx (old) .mailcap handling flaw
-
http://www.openwall.com/lists/oss-security/2008/10/29/5
oss-security - Re: CVE request: lynx (old) .mailcap handling flaw
-
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:002 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://sourceforge.net/mailarchive/forum.php?thread_name=200901032045.17604.jseward%40acm.org&forum_name=valgrind-announce
Thread: [Valgrind-announce] Valgrind-3.4.0 is available | Valgrind, an open-source memory debugger
-
http://www.openwall.com/lists/oss-security/2008/10/29/9
oss-security - Re: CVE request: lynx (old) .mailcap handling flaw
-
http://security.gentoo.org/glsa/glsa-200902-03.xml
Valgrind: Untrusted search path (GLSA 200902-03) — Gentoo security
-
http://www.openwall.com/lists/oss-security/2008/10/28/5
oss-security - Re: CVE request: lynx (old) .mailcap handling flaw
Jump to