The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/107710 - | |
References | () http://packetstormsecurity.com/files/134484/Chkrootkit-Local-Privilege-Escalation.html - | |
References | () http://www.chkrootkit.org/ - Vendor Advisory | |
References | () http://www.debian.org/security/2014/dsa-2945 - | |
References | () http://www.openwall.com/lists/oss-security/2014/06/04/9 - Exploit | |
References | () http://www.ubuntu.com/usn/USN-2230-1 - | |
References | () https://security.gentoo.org/glsa/201709-05 - | |
References | () https://www.exploit-db.com/exploits/38775/ - |
Information
Published : 2014-10-25 22:55
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0476
Mitre link : CVE-2014-0476
CVE.ORG link : CVE-2014-0476
JSON object : View
Products Affected
canonical
- ubuntu_linux
chkrootkit
- chkrootkit
CWE
CWE-20
Improper Input Validation