Description
Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form "$VAR/EVAR=arg", which cause the EVAR portion to be appended to a buffer returned by a getenv function call.
Published: 2005-11-20
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2005-3345 Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form "$VAR/EVAR=arg", which cause the EVAR portion to be appended to a buffer returned by a getenv function call.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published:

Updated: 2024-08-07T23:10:08.459Z

Reserved: 2005-10-27T00:00:00.000Z

Link: CVE-2005-3346

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2005-11-20T21:03:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2005-3346

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses