First published: Wed Sep 07 2005(Updated: )
Untrusted search path vulnerability in Net-SNMP 5.2.1.2 and earlier, on Gentoo Linux, installs certain Perl modules with an insecure DT_RPATH, which could allow local users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Net-SNMP Agent Libraries | =5.0.6 | |
CentOS Net-SNMP Agent Libraries | =5.0.9 | |
CentOS Net-SNMP Agent Libraries | =5.0 | |
CentOS Net-SNMP Agent Libraries | <=5.2.1.2_r1 | |
CentOS Net-SNMP Agent Libraries | =5.0.4_pre2 | |
CentOS Net-SNMP Agent Libraries | =5.0.7 | |
CentOS Net-SNMP Agent Libraries | =5.2.1 | |
CentOS Net-SNMP Agent Libraries | =5.0.2 | |
CentOS Net-SNMP Agent Libraries | =5.2 | |
CentOS Net-SNMP Agent Libraries | =5.0.1 | |
CentOS Net-SNMP Agent Libraries | =5.1.3 | |
CentOS Net-SNMP Agent Libraries | =5.0.3 | |
CentOS Net-SNMP Agent Libraries | =5.1.2 | |
CentOS Net-SNMP Agent Libraries | =5.0.5 | |
CentOS Net-SNMP Agent Libraries | =5.0.10 | |
CentOS Net-SNMP Agent Libraries | =5.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2811 is considered a moderate severity vulnerability.
To fix CVE-2005-2811, upgrade Net-SNMP to version 5.2.1.3 or later.
CVE-2005-2811 affects users of Net-SNMP 5.2.1.2 and earlier on Gentoo Linux.
CVE-2005-2811 allows local users to gain elevated privileges through an untrusted search path.
CVE-2005-2811 impacts systems running vulnerable versions of Net-SNMP, specifically on Gentoo Linux.