Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious –db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Valgrind | Valgrind | * | 3.4.0 (including) |
Valgrind | Valgrind | 1.9.6 (including) | 1.9.6 (including) |
Valgrind | Valgrind | 2.0.0 (including) | 2.0.0 (including) |
Valgrind | Valgrind | 2.1.0 (including) | 2.1.0 (including) |
Valgrind | Valgrind | 2.1.1 (including) | 2.1.1 (including) |
Valgrind | Valgrind | 2.2.0 (including) | 2.2.0 (including) |
Valgrind | Valgrind | 2.4.1 (including) | 2.4.1 (including) |
Valgrind | Valgrind | 3.0.0 (including) | 3.0.0 (including) |
Valgrind | Valgrind | 3.0.1 (including) | 3.0.1 (including) |
Valgrind | Valgrind | 3.1.0 (including) | 3.1.0 (including) |
Valgrind | Valgrind | 3.1.1 (including) | 3.1.1 (including) |
Valgrind | Valgrind | 3.2.0 (including) | 3.2.0 (including) |
Valgrind | Valgrind | 3.2.1 (including) | 3.2.1 (including) |
Valgrind | Valgrind | 3.2.2 (including) | 3.2.2 (including) |
Valgrind | Valgrind | 3.2.3 (including) | 3.2.3 (including) |
Valgrind | Valgrind | 3.3.0 (including) | 3.3.0 (including) |
Valgrind | Valgrind | 3.3.0-rc1 (including) | 3.3.0-rc1 (including) |
Valgrind | Valgrind | 3.3.0-rc2 (including) | 3.3.0-rc2 (including) |
Valgrind | Valgrind | 3.3.0-rc3 (including) | 3.3.0-rc3 (including) |
Valgrind | Valgrind | 3.3.1 (including) | 3.3.1 (including) |
Valgrind | Valgrind | 3.3.1-rc1 (including) | 3.3.1-rc1 (including) |
Red Hat Enterprise Linux 5 | RedHat | valgrind-1:3.5.0-1.el5 | * |
Valgrind | Ubuntu | dapper | * |
Valgrind | Ubuntu | gutsy | * |
Valgrind | Ubuntu | hardy | * |
Valgrind | Ubuntu | intrepid | * |
Valgrind | Ubuntu | upstream | * |