Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Trickle | Monkey | 1.07 (including) | 1.07 (including) |
Trickle | Ubuntu | dapper | * |
Trickle | Ubuntu | gutsy | * |
Trickle | Ubuntu | hardy | * |
Trickle | Ubuntu | intrepid | * |
Trickle | Ubuntu | jaunty | * |
Trickle | Ubuntu | upstream | * |