First published: Fri Dec 16 2005(Updated: )
Untrusted search path vulnerability in Qt-UnixODBC before 3.3.4-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Qt-unixodbc | <=3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4279 is considered to have a moderate severity level due to the potential privilege escalation it allows.
To fix CVE-2005-4279, upgrade to Qt-UnixODBC version 3.3.4-r1 or later on Gentoo Linux.
Local users in the portage group on Gentoo Linux systems with Qt-UnixODBC version 3.3.3 or earlier are affected by CVE-2005-4279.
CVE-2005-4279 is caused by an untrusted search path vulnerability that allows a malicious shared object to be executed.
CVE-2005-4279 is primarily a concern for systems running outdated versions of Qt-UnixODBC on Gentoo Linux.