6.2

CVE-2011-0532

The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

Data is provided by the National Vulnerability Database (NVD)
Fedoraproject389 Directory Server Version1.2.5 Updaterc1
Fedoraproject389 Directory Server Version1.2.5 Updaterc2
Fedoraproject389 Directory Server Version1.2.5 Updaterc3
Fedoraproject389 Directory Server Version1.2.5 Updaterc4
Fedoraproject389 Directory Server Version1.2.6 Updatea2
Fedoraproject389 Directory Server Version1.2.6 Updatea3
Fedoraproject389 Directory Server Version1.2.6 Updatea4
Fedoraproject389 Directory Server Version1.2.6 Updaterc1
Fedoraproject389 Directory Server Version1.2.6 Updaterc2
Fedoraproject389 Directory Server Version1.2.6 Updaterc3
Fedoraproject389 Directory Server Version1.2.6 Updaterc6
Fedoraproject389 Directory Server Version1.2.6 Updaterc7
Fedoraproject389 Directory Server Version1.2.6.1
Fedoraproject389 Directory Server Version1.2.7 Updatealpha3
Fedoraproject389 Directory Server Version1.2.7.5
Fedoraproject389 Directory Server Version1.2.8 Updatealpha1
Fedoraproject389 Directory Server Version1.2.8 Updatealpha2
RedhatDirectory Server Version8.2
RedhatDirectory Server Version8.2.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.113
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.2 1.9 10
AV:L/AC:H/Au:N/C:C/I:C/A:C