Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount command.
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.immunitysec.com/pipermail/dailydave/2006-April/003152.html - Exploit | |
References | () http://secunia.com/advisories/19903 - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/25131 - Patch | |
References | () http://www.truecrypt.org/history.php - Patch | |
References | () http://www.vupen.com/english/advisories/2006/1591 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26191 - |
Information
Published : 2006-05-04 12:38
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2183
Mitre link : CVE-2006-2183
CVE.ORG link : CVE-2006-2183
JSON object : View
Products Affected
truecrypt_foundation
- truecrypt
CWE