6.3
CVSSv2

CVE-2015-5200

Published: 08/09/2015 Updated: 22/12/2016
CVSS v2 Base Score: 6.3 | Impact Score: 9.2 | Exploitability Score: 3.4
VMScore: 561
Vector: AV:L/AC:M/Au:N/C:N/I:C/A:C

Vulnerability Summary

The trace functionality in libvdpau prior to 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

libvdpau project libvdpau

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

canonical ubuntu linux 12.04

Vendor Advisories

Debian Bug report logs - #797895 libvdpau: CVE-2015-5198, CVE-2015-5199, CVE-2015-5200 Package: src:libvdpau; Maintainer for src:libvdpau is Debian NVIDIA Maintainers <pkg-nvidia-devel@listsaliothdebianorg>; Reported by: Alessandro Ghedini <ghedo@debianorg> Date: Thu, 3 Sep 2015 12:51:02 UTC Severity: important ...
libvdpau could be made to run programs as an administrator ...
Florian Weimer of Red Hat Product Security discovered that libvdpau, the VDPAU wrapper library, did not properly validate environment variables, allowing local attackers to gain additional privileges For the oldstable distribution (wheezy), these problems have been fixed in version 041-7+deb7u1 For the stable distribution (jessie), these proble ...