ID CVE-2010-3362
Summary lastfm 1.5.4 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
References
Vulnerable Configurations
  • last.fm 1.5.4
    cpe:2.3:a:last:last.fm:1.5.4
CVSS
Base: 6.9 (as of 21-10-2010 - 11:17)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
NASL family Gentoo Local Security Checks
NASL id GENTOO_GLSA-201412-09.NASL
description The remote host is affected by the vulnerability described in GLSA-201412-09 (Multiple packages, Multiple vulnerabilities fixed in 2011) Vulnerabilities have been discovered in the packages listed below. Please review the CVE identifiers in the Reference section for details. FMOD Studio PEAR Mail LVM2 GnuCash xine-lib Last.fm Scrobbler WebKitGTK+ shadow tool suite PEAR unixODBC Resource Agents mrouted rsync XML Security Library xrdb Vino OProfile syslog-ng sFlow Toolkit GNOME Display Manager libsoup CA Certificates Gitolite QtCreator Racer Impact : A context-dependent attacker may be able to gain escalated privileges, execute arbitrary code, cause Denial of Service, obtain sensitive information, or otherwise bypass security restrictions. Workaround : There are no known workarounds at this time.
last seen 2019-02-21
modified 2017-04-15
plugin id 79962
published 2014-12-15
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=79962
title GLSA-201412-09 : Multiple packages, Multiple vulnerabilities fixed in 2011
refmap via4
confirm http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598294
Last major update 21-10-2010 - 00:00
Published 20-10-2010 - 14:00
Back to Top