Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form "$VAR/EVAR=arg", which cause the EVAR portion to be appended to a buffer returned by a getenv function call.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: debian
Published: 2005-11-20T21:00:00
Updated: 2024-08-07T23:10:08.459Z
Reserved: 2005-10-27T00:00:00
Link: CVE-2005-3346

No data.

Status : Modified
Published: 2005-11-20T21:03:00.000
Modified: 2024-11-21T00:01:40.550
Link: CVE-2005-3346

No data.