ID CVE-2006-0576
Summary Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.
References
Vulnerable Configurations
  • Maynard Johnson OProfile 0.1
    cpe:2.3:a:maynard_johnson:oprofile:0.1
  • Maynard Johnson OProfile 0.2
    cpe:2.3:a:maynard_johnson:oprofile:0.2
  • Maynard Johnson OProfile 0.3
    cpe:2.3:a:maynard_johnson:oprofile:0.3
  • Maynard Johnson OProfile 0.4
    cpe:2.3:a:maynard_johnson:oprofile:0.4
  • Maynard Johnson OProfile 0.5
    cpe:2.3:a:maynard_johnson:oprofile:0.5
  • Maynard Johnson OProfile 0.5.1
    cpe:2.3:a:maynard_johnson:oprofile:0.5.1
  • Maynard Johnson OProfile 0.5.2
    cpe:2.3:a:maynard_johnson:oprofile:0.5.2
  • Maynard Johnson OProfile 0.5.3
    cpe:2.3:a:maynard_johnson:oprofile:0.5.3
  • Maynard Johnson OProfile 0.5.4
    cpe:2.3:a:maynard_johnson:oprofile:0.5.4
  • Maynard Johnson OProfile 0.6
    cpe:2.3:a:maynard_johnson:oprofile:0.6
  • Maynard Johnson OProfile 0.6.1
    cpe:2.3:a:maynard_johnson:oprofile:0.6.1
  • Maynard Johnson OProfile 0.7
    cpe:2.3:a:maynard_johnson:oprofile:0.7
  • Maynard Johnson OProfile 0.7.1
    cpe:2.3:a:maynard_johnson:oprofile:0.7.1
  • Maynard Johnson OProfile 0.8
    cpe:2.3:a:maynard_johnson:oprofile:0.8
  • Maynard Johnson OProfile 0.8.1
    cpe:2.3:a:maynard_johnson:oprofile:0.8.1
  • Maynard Johnson OProfile 0.8.2
    cpe:2.3:a:maynard_johnson:oprofile:0.8.2
  • Maynard Johnson OProfile 0.9
    cpe:2.3:a:maynard_johnson:oprofile:0.9
  • Maynard Johnson OProfile 0.9.1
    cpe:2.3:a:maynard_johnson:oprofile:0.9.1
CVSS
Base: 7.2 (as of 08-02-2006 - 10:19)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
oval via4
accepted 2013-04-29T04:09:44.301-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.
family unix
id oval:org.mitre.oval:def:10890
status accepted
submitted 2010-07-09T03:56:16-04:00
title Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.
version 22
refmap via4
bid 16536
bugtraq 20060207 Arbitrary code execution via OProfile
misc http://www.redhat.com/magazine/012oct05/features/oprofile/
statements via4
contributor Joshua Bressers
lastmodified 2006-09-20
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 3 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207347 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue was fixed for Red Hat Enterprise Linux 4 in the following errata: http://rhn.redhat.com/errata/RHEA-2006-0355.html This issue does not affect Red Hat Enterprise Linux 2
Last major update 16-06-2011 - 00:00
Published 07-02-2006 - 19:06
Last modified 19-10-2018 - 11:45
Back to Top