CVE-2006-2183

Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount command.
Configurations

Configuration 1 (hide)

cpe:2.3:a:truecrypt_foundation:truecrypt:4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://lists.immunitysec.com/pipermail/dailydave/2006-April/003152.html - Exploit () http://lists.immunitysec.com/pipermail/dailydave/2006-April/003152.html - Exploit
References () http://secunia.com/advisories/19903 - Patch, Vendor Advisory () http://secunia.com/advisories/19903 - Patch, Vendor Advisory
References () http://www.osvdb.org/25131 - Patch () http://www.osvdb.org/25131 - Patch
References () http://www.truecrypt.org/history.php - Patch () http://www.truecrypt.org/history.php - Patch
References () http://www.vupen.com/english/advisories/2006/1591 - () http://www.vupen.com/english/advisories/2006/1591 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26191 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26191 -

Information

Published : 2006-05-04 12:38

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2183

Mitre link : CVE-2006-2183

CVE.ORG link : CVE-2006-2183


JSON object : View

Products Affected

truecrypt_foundation

  • truecrypt