CVE-2011-0532
The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.Enginsight
Vendor | Product | Version |
---|---|---|
fedoraproject | 389_directory_server | 1.2.1 |
fedoraproject | 389_directory_server | 1.2.2 |
fedoraproject | 389_directory_server | 1.2.3 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.5 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6 |
fedoraproject | 389_directory_server | 1.2.6.1 |
fedoraproject | 389_directory_server | 1.2.7 |
fedoraproject | 389_directory_server | 1.2.7.5 |
fedoraproject | 389_directory_server | 1.2.8 |
fedoraproject | 389_directory_server | 1.2.8 |
redhat | directory_server | 8.2 |
redhat | directory_server | 8.2.3 |
Common Weakness Enumeration