Untrusted search path vulnerability in a certain Debian GNU/Linux patch for the couchdb script in CouchDB 0.8.0 allows local users to gain privileges via a crafted shared library in the current working directory.
References
Configurations
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594412 - | |
References | () http://secunia.com/advisories/41383 - Vendor Advisory | |
References | () http://www.debian.org/security/2010/dsa-2107 - | |
References | () http://www.nth-dimension.org.uk/blog.php?id=87 - | |
References | () http://www.openwall.com/lists/oss-security/2010/08/25/7 - | |
References | () http://www.openwall.com/lists/oss-security/2010/08/26/1 - | |
References | () http://www.openwall.com/lists/oss-security/2010/08/26/5 - | |
References | () http://www.openwall.com/lists/oss-security/2010/08/29/4 - | |
References | () http://www.securityfocus.com/bid/42758 - | |
References | () http://www.vupen.com/english/advisories/2010/2341 - Vendor Advisory |
Information
Published : 2010-09-14 19:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2953
Mitre link : CVE-2010-2953
CVE.ORG link : CVE-2010-2953
JSON object : View
Products Affected
apache
- couchdb
CWE