Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2010-4167
Description:Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
Test IDs: 1.3.6.1.4.1.25623.1.0.68683   1.3.6.1.4.1.25623.1.0.68752   1.3.6.1.4.1.25623.1.0.68746   1.3.6.1.4.1.25623.1.0.71117   1.3.6.1.4.1.25623.1.0.123974   1.3.6.1.4.1.25623.1.0.870567  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2010-4167
BugTraq ID: 45044
http://www.securityfocus.com/bid/45044
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052515.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052599.html
http://www.openwall.com/lists/oss-security/2010/11/13/1
http://www.openwall.com/lists/oss-security/2010/11/15/3
RedHat Security Advisories: RHSA-2012:0544
http://rhn.redhat.com/errata/RHSA-2012-0544.html
http://secunia.com/advisories/42497
http://secunia.com/advisories/42744
http://secunia.com/advisories/48100
http://secunia.com/advisories/49063
http://www.ubuntu.com/usn/USN-1028-1
http://www.vupen.com/english/advisories/2010/3150
http://www.vupen.com/english/advisories/2010/3322




© 1998-2021 E-Soft Inc. All rights reserved.