First published: Tue Oct 17 2006(Updated: )
Untrusted search path vulnerability in OpenBase SQL 10.0 and earlier, as used in Apple Xcode 2.2 2.2 and earlier and possibly other products, allows local users to execute arbitrary code via a modified PATH that references a malicious gzip program, which is executed by gnutar with certain TAR_OPTIONS environment variable settings, when gnutar is invoked by OpenBase.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
David Branco Openbase | =7.0.15 | |
David Branco Openbase | <=10.0 | |
David Branco Openbase | =9.1.5 | |
David Branco Openbase | =8.0.4 | |
Apple Xcode | <=2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5327 is classified as a significant vulnerability allowing local users to execute arbitrary code.
To fix CVE-2006-5327, update to a version of OpenBase SQL that is newer than 10.0 or apply relevant patches provided by the vendor.
CVE-2006-5327 affects local users running OpenBase SQL versions 10.0 and earlier, as well as Apple Xcode up to version 2.2.
CVE-2006-5327 impacts applications that include OpenBase SQL and Apple Xcode, especially in configurations using specific versions.
CVE-2006-5327 cannot be exploited remotely as it requires local user access and specific conditions to be met.