7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
6.7 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
0.4%
Buffer overflow in the environment variable substitution code in main.c in OSH 1.7-14 allows local users to inject arbitrary environment variables, such as LD_PRELOAD, via pathname arguments of the form “$VAR/EVAR=arg”, which cause the EVAR portion to be appended to a buffer returned by a getenv function call.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312
pulltheplug.org/users/core/files/x_osh3.sh
secunia.com/advisories/17527
secunia.com/advisories/17967
www.debian.org/security/2005/dsa-918
www.osvdb.org/20720
www.securityfocus.com/bid/15370
www.vupen.com/english/advisories/2005/2378
exchange.xforce.ibmcloud.com/vulnerabilities/23091