Description
If LD_LIBRARY_PATH is undefined in gargoyle-free before 2009-08-25, the variable will point to the current directory. This can allow a local user to trick another user into running gargoyle in a directory with a cracked libgarglk.so and gain access to the user's account.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2010-3357 | If LD_LIBRARY_PATH is undefined in gargoyle-free before 2009-08-25, the variable will point to the current directory. This can allow a local user to trick another user into running gargoyle in a directory with a cracked libgarglk.so and gain access to the user's account. |
References
| Link | Providers |
|---|---|
| https://security-tracker.debian.org/tracker/CVE-2010-3359 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T03:03:18.995Z
Reserved: 2010-09-15T00:00:00.000Z
Link: CVE-2010-3359
No data.
Status : Modified
Published: 2019-11-12T19:15:10.897
Modified: 2024-11-21T01:18:34.510
Link: CVE-2010-3359
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD