cve-2005-3582
Vulnerability from cvelistv5
Published
2005-11-16 07:37
Modified
2024-08-07 23:17
Severity ?
EPSS score ?
Summary
ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17427", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17427/" }, { "name": "GLSA-200511-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-02.xml" }, { "name": "ADV-2005-2281", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2281" }, { "name": "20528", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20528" }, { "name": "15120", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-20T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17427", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17427/" }, { "name": "GLSA-200511-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-02.xml" }, { "name": "ADV-2005-2281", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2281" }, { "name": "20528", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20528" }, { "name": "15120", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3582", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17427", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17427/" }, { "name": "GLSA-200511-02", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-02.xml" }, { "name": "ADV-2005-2281", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2281" }, { "name": "20528", "refsource": "OSVDB", "url": "http://www.osvdb.org/20528" }, { "name": "15120", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15120" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3582", "datePublished": "2005-11-16T07:37:00", "dateReserved": "2005-11-16T00:00:00", "dateUpdated": "2024-08-07T23:17:23.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-3582\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-11-16T07:42:00.000\",\"lastModified\":\"2011-03-08T02:26:48.580\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Not vulnerable. This issue is caused by the way ImageMagick was packaged by Gentoo and does not affect Red Hat Enterprise Linux packages.\",\"lastModified\":\"2006-08-16T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.2},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:4.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6453D6A0-DF88-4850-B5EC-26D3459783E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:4.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5249DA0D-1580-4209-BF96-619A2E476BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5102CCA1-31F6-4CCE-BAF9-C7D30FDD24E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72AA00DF-D99F-4C77-9466-44ECB7411584\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99ECD9C7-3E03-4D52-B6C9-BF702208C228\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7AAE3F-5E24-4688-B00B-B5C8A0021877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01173B1A-AA23-476D-A3F9-6B5728E6A273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D83FADC-4C7F-4C16-BBAA-9883D7449744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46159EE9-4059-436B-9C6B-41C059827204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76BD93B-D3AA-4BDF-99DA-ED9485FA7246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D654459-4B94-4339-A037-29734BFD6774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DB259A-4F68-411B-9990-F4D01DF2F82D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0BC01FE-874F-42BC-8D81-40A288317640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0751A64A-3668-469D-A984-FA1F06BC1D1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"982B2F93-71E9-4261-906E-7A466B22D3ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB06B25-300F-4B91-86B5-CF0FF9C01982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2563ABE-D1C3-4AB8-BC41-8029E358C2CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7CBAAEC-AF7B-4375-B1C5-617EF6692DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6534A963-C0A7-47D6-8E1B-B8D0F3933428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4234EA44-0B0A-461A-97AD-2C18E3B5C25E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60D46680-F10C-436E-B949-366921E4AE59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC49C98-950B-4646-969B-3C10037EA00B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D688BCB-7B72-4546-BA3C-44B9157FCD9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.4.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBBC9032-497C-4B24-9B90-7A3374668C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CAEBFAC-52E9-4BD4-BAA9-2007095EB260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E5FC41E-5E0E-4357-AE31-EF9742A155B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F108FC3C-FE51-450E-BB70-93C29B874EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C698D6A2-17AD-4898-AA87-5FDC78B9ED4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2CBD232-B9CD-4EF1-A090-535E713EAAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02E4063-E2B2-4EC5-9864-D2FB3E73F574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.7.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF74EDCA-F81A-423A-AEA2-833039400309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.7.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCF62FDF-E55E-4B1E-8D84-73C44992FD9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.7q8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B358AFB2-347E-4FEC-B1B1-BA1AF49961F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:5.5.7q16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F03436CB-798E-4196-B5BA-A23149034570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A27CAC75-BFE8-4865-A6AE-20225BFCDBA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6FF60EE-CFFA-43AD-AA46-004EBBFF3765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B851A570-B5D4-4562-8FD2-3211E6A6C19B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"882E6544-A384-41C8-BEFA-62771D72906A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6741F75-E6B1-4FCE-9C57-C912816C7F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6E66D8-BEC4-4E0D-BAAE-979618405C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED8AE39C-9F96-43AB-843E-42B931154B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F91C63C5-765B-4511-B6CF-CA09433DE051\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8DB31B-68ED-4538-B2F4-6A9188B2969D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E48A747E-27D5-4275-ACB9-E978AB383D7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD85045-0175-4270-9EC4-01236158A71B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12378D7-6A7E-4636-9551-C224907A3219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4464D0E1-BAA9-479F-814A-17DE99BE7D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4644A7F5-57D9-4558-A1AA-D55516FD56B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"505A3675-8DA4-4AFD-9A56-13A95B1D0174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338F37B1-0A4C-4600-88FE-F86A020A1239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE671263-8471-4ED5-A836-B7F7D64D8DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF1B109-2299-4AB2-AB82-D73669F1EA7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0EE6928-6449-4241-8DC5-082009724A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.1.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8973BA-CC26-499E-A5AB-35B5BD7DAF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C8CA07-E1D3-427B-AFA0-4110868D00DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C2F16E9-D441-45F6-B27A-9CB6D19A26BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F50C03E-B94A-47C5-B394-3636BEE34EA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:imagemagick:imagemagick:6.2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D85FBFE-9674-4ADF-887B-0D985CDC88EF\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/17427/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200511-02.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/20528\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/15120\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2281\",\"source\":\"cve@mitre.org\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.