Untrusted search path vulnerability in ProxyChains-NG before 4.9 allows local users to gain privileges via a Trojan horse libproxychains4.so library in the current working directory, which is referenced in the LD_PRELOAD path.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2015/05/13/11 | patch mailing list third party advisory issue tracking |
https://github.com/rofl0r/proxychains-ng/commit/9ab7dbeb3baff67a51d0c5e71465c453be0890b5#diff-803c5170888b8642f2a97e5e9423d399 | patch third party advisory issue tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=1147013 | patch third party advisory issue tracking |
http://www.securityfocus.com/bid/74648 | third party advisory vdb entry |
https://github.com/rofl0r/proxychains-ng/blob/v4.9/README#L56 | release notes issue tracking |
https://github.com/rofl0r/proxychains-ng/issues/60 | patch third party advisory issue tracking |