CVE-2005-4790

N/A Unknown
Published: December 31, 2005 Modified: April 16, 2026
View on NVD

Description

Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam. NOTE: in August 2007, the tomboy vector was reported for other distributions.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/39577
Source: cve@mitre.org
http://osvdb.org/39578
Source: cve@mitre.org
http://secunia.com/advisories/26480
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27608
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27621
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27799
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28339
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28672
Source: cve@mitre.org
Vendor Advisory
https://usn.ubuntu.com/560-1/
Source: cve@mitre.org
http://bugs.gentoo.org/show_bug.cgi?id=188806
Source: af854a3a-2127-422b-91ae-364da2661108
http://bugs.gentoo.org/show_bug.cgi?id=189249
Source: af854a3a-2127-422b-91ae-364da2661108
http://bugs.gentoo.org/show_bug.cgi?id=199841
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/39577
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/39578
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26480
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27608
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27621
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27799
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28339
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28672
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200711-12.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200801-14.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:064
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2005_22_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/25341
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.gnome.org/show_bug.cgi?id=485224
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=362941
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/36054
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/560-1/
Source: af854a3a-2127-422b-91ae-364da2661108

44 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.3%
57th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

novell suse