Lucene search

K
cve[email protected]CVE-2005-4278
HistoryDec 16, 2005 - 11:03 a.m.

CVE-2005-4278

2005-12-1611:03:00
web.nvd.nist.gov
18
cve-2005-4278
untrusted search path vulnerability
perl
gentoo linux
local users
privileges
shared object

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

25.8%

Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.

Affected configurations

NVD
Node
larry_wallperlRange5.8.6
OR
larry_wallperlMatch5.3
OR
larry_wallperlMatch5.4
OR
larry_wallperlMatch5.4.5
OR
larry_wallperlMatch5.5
OR
larry_wallperlMatch5.5.3
OR
larry_wallperlMatch5.6.1
OR
larry_wallperlMatch5.8.0
OR
larry_wallperlMatch5.8.1
OR
larry_wallperlMatch5.8.3
OR
larry_wallperlMatch5.8.4
OR
larry_wallperlMatch5.8.4.1
OR
larry_wallperlMatch5.8.4.2
OR
larry_wallperlMatch5.8.4.2.3
OR
larry_wallperlMatch5.8.4.3
OR
larry_wallperlMatch5.8.4.4
OR
larry_wallperlMatch5.8.4.5

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

25.8%