CVE-2008-3278
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/11/2019
Last modified:
21/11/2024
Description
frysk packages through 2008-08-05 as shipped in Red Hat Enterprise Linux 5 are built with an insecure RPATH set in the ELF header of multiple binaries in /usr/bin/f* (e.g. fcore, fcatch, fstack, fstep, ...) shipped in the package. A local attacker can exploit this vulnerability by running arbitrary code as another user.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:frysk:*:*:*:*:*:*:*:* | 2008-08-05 (including) | |
| cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/security/cve/cve-2008-3278
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3278
- https://security-tracker.debian.org/tracker/CVE-2008-3278
- https://access.redhat.com/security/cve/cve-2008-3278
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3278
- https://security-tracker.debian.org/tracker/CVE-2008-3278



