Last Modified: Oct. 18, 2016
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Base Score: 7.2
Exploitability Score: 3.9
Impact Score: 10.0
CVSS V2: AV:L/AC:L/Au:N/C:C/I:C/A:C
NVD-CWE-Other
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:* Part: o Vendor: slackware | Alle Schwachstellen für slackware | |
cpe:2.3:o:slackware:slackware_linux:2.0.35:*:*:*:*:*:*:* Part: o Vendor: slackware | Alle Schwachstellen für slackware |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:slackware:slackware_linux:2.0.35:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="local"/> </set>
<?xml version="1.0" ?> <set operator="and"> <prop key="target" value="host"/> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="output"/> <prop key="program_influence" value="existence"/> </set> <prop key="data" value="any"/> <set operator="or"> <prop key="data_influence" value="read"/> <prop key="data_influence" value="write"/> <prop key="data_influence" value="delete"/> </set> <set operator="or"> <prop key="range" value="local"/> <prop key="range" value="local"/> </set> </set>