ID CVE-2005-4532
Summary scponlyc in scponly 4.1 and earlier, when the operating system supports LD_PRELOAD mechanisms, allows local users to execute arbitrary code with root privileges by creating a chroot directory in their home directory, hard linking to a system setuid application, and using a modified LD_PRELOAD to modify expected function calls in the setuid application.
References
Vulnerable Configurations
  • cpe:2.3:a:scponly:scponly:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.2:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.3:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.6:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.7:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:scponly:scponly:4.1:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 20-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 16051
confirm http://sublimation.org/scponly/#relnotes
debian DSA-969
gentoo GLSA-200512-17
secunia
  • 18223
  • 18236
  • 18829
xf scponly-scponlyc-privilege-escalation(23874)
Last major update 20-07-2017 - 01:29
Published 28-12-2005 - 01:03
Last modified 20-07-2017 - 01:29
Back to Top