ID CVE-2006-0576
Summary Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability. Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'
References
Vulnerable Configurations
  • cpe:2.3:a:maynard_johnson:oprofile:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:maynard_johnson:oprofile:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:maynard_johnson:oprofile:0.9.1:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 19-10-2018 - 15:45)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
oval via4
accepted 2013-04-29T04:09:44.301-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.
family unix
id oval:org.mitre.oval:def:10890
status accepted
submitted 2010-07-09T03:56:16-04:00
title Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.
version 28
refmap via4
bid 16536
bugtraq 20060207 Arbitrary code execution via OProfile
misc http://www.redhat.com/magazine/012oct05/features/oprofile/
statements via4
contributor Joshua Bressers
lastmodified 2006-09-20
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 3 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207347 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue was fixed for Red Hat Enterprise Linux 4 in the following errata: http://rhn.redhat.com/errata/RHEA-2006-0355.html This issue does not affect Red Hat Enterprise Linux 2
Last major update 19-10-2018 - 15:45
Published 08-02-2006 - 00:06
Last modified 19-10-2018 - 15:45
Back to Top