itetris/xitetris 1.6.2 and earlier trusts the PATH environmental variable to find and execute the gunzip program, which allows local users to gain root privileges by changing their PATH so that it points to a malicious gunzip program.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/2139 | patch vendor advisory vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5795 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2000-12/0295.html | vendor advisory mailing list exploit |