Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-0646 | First vendor Publication | 2006-02-11 |
Vendor | Cve | Last vendor Modification | 2008-09-05 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.4 | Attack Range | Local |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0646 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
23111 | SUSE Linux ld RPATH Variable Subversion Privilege Escalation |
Sources (Detail)
Source | Url |
---|---|
BID | http://www.securityfocus.com/bid/16581 |
SECUNIA | http://secunia.com/advisories/18811 |
SUSE | http://lists.suse.com/archive/suse-security-announce/2006-Feb/0003.html |
Alert History
Date | Informations |
---|---|
2021-05-04 12:03:42 |
|
2021-04-22 01:04:13 |
|
2020-05-23 00:17:24 |
|
2016-04-26 14:17:44 |
|
2013-05-11 10:49:07 |
|