CVE Vulnerabilities

CVE-2006-0576

Published: Feb 08, 2006 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs. NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo. In such a context, this is a vulnerability.

Affected Software

NameVendorStart VersionEnd Version
OprofileMaynard_johnson*0.9.1 (including)
OprofileMaynard_johnson0.1 (including)0.1 (including)
OprofileMaynard_johnson0.2 (including)0.2 (including)
OprofileMaynard_johnson0.3 (including)0.3 (including)
OprofileMaynard_johnson0.4 (including)0.4 (including)
OprofileMaynard_johnson0.5 (including)0.5 (including)
OprofileMaynard_johnson0.5.1 (including)0.5.1 (including)
OprofileMaynard_johnson0.5.2 (including)0.5.2 (including)
OprofileMaynard_johnson0.5.3 (including)0.5.3 (including)
OprofileMaynard_johnson0.5.4 (including)0.5.4 (including)
OprofileMaynard_johnson0.6 (including)0.6 (including)
OprofileMaynard_johnson0.6.1 (including)0.6.1 (including)
OprofileMaynard_johnson0.7 (including)0.7 (including)
OprofileMaynard_johnson0.7.1 (including)0.7.1 (including)
OprofileMaynard_johnson0.8 (including)0.8 (including)
OprofileMaynard_johnson0.8.1 (including)0.8.1 (including)
OprofileMaynard_johnson0.8.2 (including)0.8.2 (including)
OprofileMaynard_johnson0.9 (including)0.9 (including)
Red Hat Enterprise Linux AS version 4RedHat*
Red Hat Enterprise Linux Desktop version 4RedHat*
Red Hat Enterprise Linux ES version 4RedHat*
Red Hat Enterprise Linux WS version 4RedHat*
OprofileUbuntudapper*
OprofileUbuntudevel*
OprofileUbuntuedgy*
OprofileUbuntufeisty*

References