Vulnerability Details : CVE-2008-4865
Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.
Exploit prediction scoring system (EPSS) score for CVE-2008-4865
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-4865
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
Vendor statements for CVE-2008-4865
-
Red Hat 2009-02-05Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-4865 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
-
http://www.openwall.com/lists/oss-security/2008/10/27/4
-
http://www.openwall.com/lists/oss-security/2008/10/29/5
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
-
http://sourceforge.net/mailarchive/forum.php?thread_name=200901032045.17604.jseward%40acm.org&forum_name=valgrind-announce
-
http://www.openwall.com/lists/oss-security/2008/10/29/9
-
http://security.gentoo.org/glsa/glsa-200902-03.xml
-
http://www.openwall.com/lists/oss-security/2008/10/28/5
- cpe:2.3:a:valgrind:valgrind:*:rc1:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.4.1:*:powerpc:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:1.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:valgrind:valgrind:3.3.0:rc3:*:*:*:*:*:*