First published: Tue Aug 05 2008(Updated: )
Untrusted search path vulnerability in ingvalidpw in Ingres 2.6, Ingres 2006 release 1 (aka 9.0.4), and Ingres 2006 release 2 (aka 9.1.0) on Linux and HP-UX allows local users to gain privileges via a crafted shared library, related to a "pointer overwrite vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Actian Ingres | =2.6 | |
Actian Ingres | =9.0.4 | |
Actian Ingres | =9.1.0 | |
HPE HP-UX | ||
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3357 is classified as a high-severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2008-3357, you should update Ingres to a patched version that addresses this vulnerability.
CVE-2008-3357 affects Ingres versions 2.6, 9.0.4, and 9.1.0 on Linux and HP-UX systems.
CVE-2008-3357 is an untrusted search path vulnerability that can be exploited via a crafted shared library.
No, CVE-2008-3357 requires local access to the system to be exploited.