Upstream information

CVE-2008-4865 at MITRE

Description

Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options. NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 445013 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Software Development Kit 11 SP4
  • valgrind >= 3.8.1-0.5.1
  • valgrind-devel >= 3.8.1-0.5.1
Patchnames:
SUSE Linux Enterprise Software Development Kit 11 SP4 GA valgrind
Novell Linux Desktop 9 SDK for x86
Novell Linux Desktop 9 SDK for x86_64
SLES SDK 9 for X86-64
SLES SDK 9 for x86
  • valgrind >= 3.2.3-0.3
sles9-nld.x86-64
core9.x86
sles9-nld.x86
core9.x86-64
YOU Patch Nr: 12312
SUSE Linux Enterprise SDK 10 SP2
  • valgrind >= 3.3.0-15.5
sle10-sp2-sdk.x86-64
sled10-sp2.x86-64
sles10-sp2-debuginfo.ppc
sles10-sp2-debuginfo.x86
sle10-sp2-sdk.ppc
sled10-sp2.x86
sle10-sp2-sdk.x86
sle10-sp2-sdk.ia64
sles10-sp2-debuginfo.x86-64
ZYPP Patch Nr: 5803
openSUSE 11.0
  • valgrind-debuginfo >= 3.3.0-43.2
  • valgrind-debugsource >= 3.3.0-43.2
openSUSE 11.0
  • valgrind >= 3.3.0-43.2
  • valgrind-devel >= 3.3.0-43.2