Описание
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
python3.1 | fixed | 3.1.2+20100703-1 | package | |
python2.6 | fixed | 2.6.5+20100529-1 | package | |
python2.5 | unfixed | package | ||
python2.5 | no-dsa | etch | package | |
python2.5 | no-dsa | lenny | package | |
python2.5 | no-dsa | squeeze | package | |
python2.4 | unfixed | package | ||
python2.4 | no-dsa | etch | package | |
python2.4 | no-dsa | lenny | package |
Примечания
I suppose the behaviour will be changed in a future Python release, but
a backport has a significant risk of breakage for little gain. If a
proper upstream patch should be available, this can be re-evaluated
http://bugs.python.org/issue5753
EPSS
Связанные уязвимости
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
ELSA-2011-0027: python security, bug fix, and enhancement update (LOW)
EPSS