Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5983

Опубликовано: 28 янв. 2009
Источник: debian
EPSS Низкий

Описание

Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python3.1fixed3.1.2+20100703-1package
python2.6fixed2.6.5+20100529-1package
python2.5unfixedpackage
python2.5no-dsaetchpackage
python2.5no-dsalennypackage
python2.5no-dsasqueezepackage
python2.4unfixedpackage
python2.4no-dsaetchpackage
python2.4no-dsalennypackage

Примечания

  • I suppose the behaviour will be changed in a future Python release, but

  • a backport has a significant risk of breakage for little gain. If a

  • proper upstream patch should be available, this can be re-evaluated

  • http://bugs.python.org/issue5753

EPSS

Процентиль: 37%
0.00152
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.

redhat
почти 17 лет назад

Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.

nvd
больше 16 лет назад

Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.

github
около 3 лет назад

Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.

oracle-oval
больше 14 лет назад

ELSA-2011-0027: python security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 37%
0.00152
Низкий