Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.
Software | From | Fixed in |
---|---|---|
valgrind / valgrind | - | 3.4.0.x |
valgrind / valgrind | 1.9.6 | 1.9.6.x |
valgrind / valgrind | 2.0.0 | 2.0.0.x |
valgrind / valgrind | 2.1.0 | 2.1.0.x |
valgrind / valgrind | 2.1.1 | 2.1.1.x |
valgrind / valgrind | 2.2.0 | 2.2.0.x |
valgrind / valgrind | 2.4.1 | 2.4.1.x |
valgrind / valgrind | 3.0.0 | 3.0.0.x |
valgrind / valgrind | 3.0.1 | 3.0.1.x |
valgrind / valgrind | 3.1.0 | 3.1.0.x |
valgrind / valgrind | 3.1.1 | 3.1.1.x |
valgrind / valgrind | 3.2.0 | 3.2.0.x |
valgrind / valgrind | 3.2.1 | 3.2.1.x |
valgrind / valgrind | 3.2.2 | 3.2.2.x |
valgrind / valgrind | 3.2.3 | 3.2.3.x |
valgrind / valgrind | 3.3.0 | 3.3.0.x |
valgrind / valgrind | 3.3.0-rc1 | 3.3.0-rc1.x |
valgrind / valgrind | 3.3.0-rc2 | 3.3.0-rc2.x |
valgrind / valgrind | 3.3.0-rc3 | 3.3.0-rc3.x |
valgrind / valgrind | 3.3.1 | 3.3.1.x |
valgrind / valgrind | 3.3.1-rc1 | 3.3.1-rc1.x |