First published: Sat Dec 31 2005(Updated: )
Untrusted search path vulnerability (RPATH) in amaya 9.2.1 on Debian GNU/Linux allows local users to gain privileges via a malicious Mesa library in the /home/anand directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
W3C Amaya | =9.2.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4728 is considered a moderate severity vulnerability due to its ability to allow local users to gain elevated privileges.
To fix CVE-2005-4728, users should remove the vulnerable version of Amaya and install an updated version that doesn't utilize an untrusted search path.
CVE-2005-4728 affects local users on Debian GNU/Linux machines using Amaya version 9.2.1.
CVE-2005-4728 can facilitate local privilege escalation attacks through the use of a malicious library.
While CVE-2005-4728 was reported over a decade ago, similar untrusted search path vulnerabilities can still pose risks if not properly addressed in current software systems.