Multiple untrusted search path vulnerabilities in dstat before 0.7.0 allow local users to gain privileges via a Trojan horse Python module in (1) the current working directory or (2) a certain subdirectory of the current working directory.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-200911-04.xml | vendor advisory |
http://osvdb.org/60511 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:341 | vendor advisory |
http://bugs.gentoo.org/show_bug.cgi?id=293497 | |
http://svn.rpmforge.net/svn/trunk/tools/dstat/ChangeLog | |
http://secunia.com/advisories/37445 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=538459 | |
http://www.redhat.com/support/errata/RHSA-2009-1619.html | vendor advisory |
http://www.securityfocus.com/bid/37131 | vdb entry patch |
http://secunia.com/advisories/37457 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8969 | vdb entry signature |