First published: Fri Mar 31 2006(Updated: )
Untrusted search path vulnerability in libapache2-svn 1.3.0-4 for Subversion in Debian GNU/Linux includes RPATH values under the /tmp/svn directory for the (1) mod_authz_svn.so and (2) mod_dav_svn.so modules, which might allow local users to gain privileges by installing malicious libraries in that directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1564 is considered a moderate security vulnerability due to its potential to allow local privilege escalation.
To fix CVE-2006-1564, it is recommended to upgrade to a version of libapache2-svn that does not include the vulnerable RPATH settings.
CVE-2006-1564 affects users of Debian GNU/Linux version 3.1 with libapache2-svn installed.
CVE-2006-1564 specifically impacts the mod_authz_svn.so and mod_dav_svn.so Apache modules.
CVE-2006-1564 is not a remote vulnerability; it requires local user access to exploit.