First published: Fri Mar 31 2006(Updated: )
Untrusted search path vulnerability in libgpib-perl 3.2.06-2 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the LinuxGpib.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1565 is classified as a moderate severity vulnerability due to the potential for local privilege escalation.
To remediate CVE-2006-1565, ensure that no untrusted libraries are present in the /tmp/buildd directory and update libgpib-perl to a version without the vulnerability.
CVE-2006-1565 affects users of Debian GNU/Linux version 3.1 across multiple architectures such as ia-64, mips, and amd64.
CVE-2006-1565 is an untrusted search path vulnerability that could facilitate local privilege escalation.
CVE-2006-1565 is primarily a local vulnerability, requiring access to the affected system to exploit.