CVE-2005-3346
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/11/2005
Last modified:
03/04/2025
Description
Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form "$VAR/EVAR=arg", which cause the EVAR portion to be appended to a buffer returned by a getenv function call.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:osh:osh:1.7.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312
- http://pulltheplug.org/users/core/files/x_osh3.sh
- http://secunia.com/advisories/17527
- http://secunia.com/advisories/17967
- http://www.debian.org/security/2005/dsa-918
- http://www.osvdb.org/20720
- http://www.securityfocus.com/bid/15370
- http://www.vupen.com/english/advisories/2005/2378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23091
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312
- http://pulltheplug.org/users/core/files/x_osh3.sh
- http://secunia.com/advisories/17527
- http://secunia.com/advisories/17967
- http://www.debian.org/security/2005/dsa-918
- http://www.osvdb.org/20720
- http://www.securityfocus.com/bid/15370
- http://www.vupen.com/english/advisories/2005/2378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23091



