Vulnerability Details CVE-2005-4280
Untrusted search path vulnerability in CMake before 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.3%
CVSS Severity
CVSS v2 Score 7.2
Products affected by CVE-2005-4280
-
cpe:2.3:a:kitware:cmake:1.4.3
-
cpe:2.3:a:kitware:cmake:1.4.4
-
cpe:2.3:a:kitware:cmake:1.4.5
-
cpe:2.3:a:kitware:cmake:1.4.6
-
cpe:2.3:a:kitware:cmake:1.4.7
-
cpe:2.3:a:kitware:cmake:1.6.0
-
cpe:2.3:a:kitware:cmake:1.6.0_beta1
-
cpe:2.3:a:kitware:cmake:1.6.0_beta2
-
cpe:2.3:a:kitware:cmake:1.6.1
-
cpe:2.3:a:kitware:cmake:1.6.2
-
cpe:2.3:a:kitware:cmake:1.6.3
-
cpe:2.3:a:kitware:cmake:1.6.4
-
cpe:2.3:a:kitware:cmake:1.6.5
-
cpe:2.3:a:kitware:cmake:1.6.6
-
cpe:2.3:a:kitware:cmake:1.6.7
-
cpe:2.3:a:kitware:cmake:1.8.0
-
cpe:2.3:a:kitware:cmake:1.8.1
-
cpe:2.3:a:kitware:cmake:1.8.2
-
cpe:2.3:a:kitware:cmake:1.8.3
-
cpe:2.3:a:kitware:cmake:2.0.0
-
cpe:2.3:a:kitware:cmake:2.0.1
-
cpe:2.3:a:kitware:cmake:2.0.2
-
cpe:2.3:a:kitware:cmake:2.0.3
-
cpe:2.3:a:kitware:cmake:2.0.4
-
cpe:2.3:a:kitware:cmake:2.0.5
-
cpe:2.3:a:kitware:cmake:2.0.6
-
cpe:2.3:a:kitware:cmake:2.2.0