CVE-2012-5380
Published Oct 11, 2012
Last updated 3 months ago
Overview
- Description
- Untrusted search path vulnerability in the installation functionality in Ruby 1.9.3-p194, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Ruby193\bin directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the Ruby installation
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Risk scores
CVSS 3.1
- Type
- Secondary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 10
- Exploitability score
- 1.5
- Vector string
- AV:L/AC:H/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-22
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0535DC9-EB0E-4745-80AC-4A020DF26E38" } ], "operator": "OR" } ] } ]