First published: Tue Sep 14 2010(Updated: )
Untrusted search path vulnerability in a certain Debian GNU/Linux patch for the couchdb script in CouchDB 0.8.0 allows local users to gain privileges via a crafted shared library in the current working directory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | =0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2953 has a moderate severity level due to its untrusted search path vulnerability allowing privilege escalation.
CVE-2010-2953 affects local users of Apache CouchDB version 0.8.0 on Debian GNU/Linux systems.
To fix CVE-2010-2953, you should update Apache CouchDB to a patched version that resolves the untrusted search path issue.
CVE-2010-2953 is an untrusted search path vulnerability that allows local users to exploit crafted shared libraries.
Yes, exploitation of CVE-2010-2953 can lead to privilege escalation and potential system compromise.