Untrusted search path vulnerability in fwsnort prior to 1.6.4, when not running as root, allows local users to execute arbitrary code via a Trojan horse fwsnort.conf in the current working directory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cipherdyne fwsnort 1.6.1 |
||
cipherdyne fwsnort 1.6 |
||
cipherdyne fwsnort 1.5 |
||
cipherdyne fwsnort 1.0 |
||
cipherdyne fwsnort 0.9.0 |
||
cipherdyne fwsnort 0.6.3 |
||
cipherdyne fwsnort 0.6.2 |
||
cipherdyne fwsnort |
||
cipherdyne fwsnort 1.0.4 |
||
cipherdyne fwsnort 1.0.3 |
||
cipherdyne fwsnort 0.8.0 |
||
cipherdyne fwsnort 0.7.0 |
||
cipherdyne fwsnort 0.5 |
||
cipherdyne fwsnort 1.0.6 |
||
cipherdyne fwsnort 1.0.5 |
||
cipherdyne fwsnort 0.8.2 |
||
cipherdyne fwsnort 0.8.1 |
||
cipherdyne fwsnort 0.6.1 |
||
cipherdyne fwsnort 0.6 |
||
cipherdyne fwsnort 1.6.3 |
||
cipherdyne fwsnort 1.6.2 |
||
cipherdyne fwsnort 1.0.2 |
||
cipherdyne fwsnort 1.0.1 |
||
cipherdyne fwsnort 0.6.5 |
||
cipherdyne fwsnort 0.6.4 |