Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-3949

Опубликовано: 22 сент. 2008
Источник: debian
EPSS Низкий

Описание

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
emacs22fixed22.2+2-4package
emacs21not-affectedpackage
xemacs21not-affectedpackage

Примечания

  • This can happen with any Python script, just because Emacs autoloads one

  • doesn't make it much worse

EPSS

Процентиль: 23%
0.00073
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

redhat
около 17 лет назад

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

nvd
около 17 лет назад

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

github
больше 3 лет назад

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

EPSS

Процентиль: 23%
0.00073
Низкий