Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and previous versions allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
maynard johnson oprofile 0.3 |
||
maynard johnson oprofile 0.4 |
||
maynard johnson oprofile 0.8.1 |
||
maynard johnson oprofile 0.5.2 |
||
maynard johnson oprofile 0.7.1 |
||
maynard johnson oprofile 0.8.2 |
||
maynard johnson oprofile 0.6 |
||
maynard johnson oprofile 0.2 |
||
maynard johnson oprofile 0.5.1 |
||
maynard johnson oprofile |
||
maynard johnson oprofile 0.8 |
||
maynard johnson oprofile 0.5.4 |
||
maynard johnson oprofile 0.5 |
||
maynard johnson oprofile 0.6.1 |
||
maynard johnson oprofile 0.7 |
||
maynard johnson oprofile 0.9 |
||
maynard johnson oprofile 0.1 |
||
maynard johnson oprofile 0.5.3 |