2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-4280" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-12-16T11:03:00.000" ,
"lastModified" : "2011-03-08T02:27:56.830" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Untrusted search path vulnerability in CMake before 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 7.2
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9F981201-E3E1-47E9-9B49-182DA3AF8022"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7D506180-8330-431B-9920-7ACC8E4792C8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.4.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A98F8409-5091-4052-87D4-72DE0D359704"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.4.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BA68B91-EDA4-4C67-A6AB-87B07AC1C05B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.4.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BBB0D186-9396-4E23-A25F-ACDE532D6258"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B52B99A2-94E5-4BCF-AE64-0906DCC941A4"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.0_beta1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C562058-93FF-41C7-B272-3CB2AF78E277"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.0_beta2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "90853617-283A-44F6-BBE2-C90D70A3FF24"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0377ABA-3697-469C-9722-5CAFEDDD7668"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4C0FE0C0-58D3-4937-98EC-D5648D7A0344"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "237E977B-F831-44BB-988E-CE03FEA707E4"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA08A35A-A5EF-40FC-9E85-0FC8B5F3F2D8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "38873CA1-ED6B-4B1E-8806-D3090FF9A14F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "561FC285-5688-4F50-9DBE-DB561995D76E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.6.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "21A033A6-23CF-420E-A03F-9D472917B28E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B10B7FB-314B-4DEC-B865-28AD1919816E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6B20A8E-1A16-4F82-BF38-B2FC45117DF3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4426A597-C039-4676-96D4-6F53FC445919"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:1.8.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79DCEE6D-94B2-4F56-A0E6-AFC07CE33337"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:2.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D450A06C-8E74-4BB8-A4DA-96AD1DEF53FF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:2.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1A6F1C72-E9B4-4BD2-AF96-052C62B0DCD6"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:2.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF97ECFD-D748-4794-9C42-8FE9D25D0541"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:2.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FAD3A63-17D7-46DA-AAD7-879BE8DCE907"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:2.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "941AEDB1-D7DE-442A-8A19-A9F50238794F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:2.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F2EE878-4E1F-4D9E-8BC4-2CD6A686EC21"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:2.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "99D0E41E-63AA-4C12-85E9-C61BDBF071F5"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:kitware:cmake:2.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0E43851-3AF5-488F-8F59-FF8826D655F7"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/17232" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/20088" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/15120" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2005/2119" ,
"source" : "cve@mitre.org"
}
]
}