First published: Wed Jan 04 2006(Updated: )
The ebuild for pinentry before 0.7.2-r2 on Gentoo Linux sets setgid bits for pinentry programs, which allows local users to read or overwrite arbitrary files as gid 0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pinentry | =0.7.2 | |
Pinentry | =0.7.2-r1 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0071 is considered a high severity vulnerability due to its potential to allow local users to read or overwrite arbitrary files as gid 0.
To fix CVE-2006-0071, update the pinentry package to version 0.7.2-r2 or later on Gentoo Linux.
CVE-2006-0071 affects users of Gentoo Linux running pinentry versions before 0.7.2-r2.
CVE-2006-0071 enables local users to exploit setgid bits to manipulate files and gain elevated access as gid 0.
CVE-2006-0071 is a local vulnerability, meaning it can only be exploited by users with local access to the system.