Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 19 Aug 2010 22:34:22 +0200
From: Niels Heinen <niels@...eBSD.org>
To: oss-security@...ts.openwall.com
Subject: CVE Request: SLiM insecure PATH assignment


Hi all,

SLiM versions prior to 1.3.1 assigned logged on users a predefined PATH
which included './'. This allowed unintentional code execution (e.g.
planted binary) and has been fixed by the developers in version 1.3.2.

Can you allocate a CVE number for this one?

Thanks,

-- 
Niels Heinen
FreeBSD committer | www.freebsd.org
PGP: 0x5FE39B80

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ