CVE-2010-3351
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/10/2010
Last modified:
11/04/2025
Description
startBristol in Bristol 0.60.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nick_copeland:bristol:0.60.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.4-1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.4-57:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.5-13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.5-19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.5-37:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.5-48:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.5-60:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.5-66:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.5-89:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.6-113:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.6-121:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.6-150:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nick_copeland:bristol:0.9.6-169:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598285
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050784.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050787.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050805.html
- http://secunia.com/advisories/42272
- http://www.securityfocus.com/bid/44335
- http://www.vupen.com/english/advisories/2010/2972
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598285
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050784.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050787.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050805.html
- http://secunia.com/advisories/42272
- http://www.securityfocus.com/bid/44335
- http://www.vupen.com/english/advisories/2010/2972



