ID CVE-2005-3346
Summary Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form "$VAR/EVAR=arg", which cause the EVAR portion to be appended to a buffer returned by a getenv function call.
References
Vulnerable Configurations
  • cpe:2.3:a:osh:osh:1.7.14:*:*:*:*:*:*:*
    cpe:2.3:a:osh:osh:1.7.14:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 11-07-2017 - 01:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 15370
confirm http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312
debian DSA-918
misc http://pulltheplug.org/users/core/files/x_osh3.sh
osvdb 20720
secunia
  • 17527
  • 17967
vupen ADV-2005-2378
xf osh-main-execute-code(23091)
Last major update 11-07-2017 - 01:33
Published 20-11-2005 - 21:03
Last modified 11-07-2017 - 01:33
Back to Top