Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Oprofile | Maynard_johnson | * | 0.9.1 (including) |
Oprofile | Maynard_johnson | 0.1 (including) | 0.1 (including) |
Oprofile | Maynard_johnson | 0.2 (including) | 0.2 (including) |
Oprofile | Maynard_johnson | 0.3 (including) | 0.3 (including) |
Oprofile | Maynard_johnson | 0.4 (including) | 0.4 (including) |
Oprofile | Maynard_johnson | 0.5 (including) | 0.5 (including) |
Oprofile | Maynard_johnson | 0.5.1 (including) | 0.5.1 (including) |
Oprofile | Maynard_johnson | 0.5.2 (including) | 0.5.2 (including) |
Oprofile | Maynard_johnson | 0.5.3 (including) | 0.5.3 (including) |
Oprofile | Maynard_johnson | 0.5.4 (including) | 0.5.4 (including) |
Oprofile | Maynard_johnson | 0.6 (including) | 0.6 (including) |
Oprofile | Maynard_johnson | 0.6.1 (including) | 0.6.1 (including) |
Oprofile | Maynard_johnson | 0.7 (including) | 0.7 (including) |
Oprofile | Maynard_johnson | 0.7.1 (including) | 0.7.1 (including) |
Oprofile | Maynard_johnson | 0.8 (including) | 0.8 (including) |
Oprofile | Maynard_johnson | 0.8.1 (including) | 0.8.1 (including) |
Oprofile | Maynard_johnson | 0.8.2 (including) | 0.8.2 (including) |
Oprofile | Maynard_johnson | 0.9 (including) | 0.9 (including) |
Red Hat Enterprise Linux AS version 4 | RedHat | * | |
Red Hat Enterprise Linux Desktop version 4 | RedHat | * | |
Red Hat Enterprise Linux ES version 4 | RedHat | * | |
Red Hat Enterprise Linux WS version 4 | RedHat | * | |
Oprofile | Ubuntu | dapper | * |
Oprofile | Ubuntu | devel | * |
Oprofile | Ubuntu | edgy | * |
Oprofile | Ubuntu | feisty | * |