TROYANOSYVIRUS
Back to CVEs

CVE-2005-4790

N/A

Description

Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam. NOTE: in August 2007, the tomboy vector was reported for other distributions.

CVE Details

CVSS v3.1 ScoreN/A
Published12/31/2005
Last Modified4/16/2026
Sourcenvd
Honeypot Sightings0

Affected Products

novell:suse_linuxsuse:suse_linux

References

http://osvdb.org/39577(cve@mitre.org)
http://osvdb.org/39578(cve@mitre.org)
http://bugs.gentoo.org/show_bug.cgi?id=188806(af854a3a-2127-422b-91ae-364da2661108)
http://bugs.gentoo.org/show_bug.cgi?id=189249(af854a3a-2127-422b-91ae-364da2661108)
http://bugs.gentoo.org/show_bug.cgi?id=199841(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/39577(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/39578(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26480(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27608(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27621(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27799(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28339(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28672(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200711-12.xml(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200801-14.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/25341(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.gnome.org/show_bug.cgi?id=485224(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=362941(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/560-1/(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.