CVE-2005-4532

high

Description

scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/23874

http://www.securityfocus.com/bid/16051

http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml

http://www.debian.org/security/2006/dsa-969

http://sublimation.org/scponly/#relnotes

http://secunia.com/advisories/18829

http://secunia.com/advisories/18236

http://secunia.com/advisories/18223

Details

Source: Mitre, NVD

Published: 2005-12-28

Updated: 2017-07-20

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High