Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-2027

Опубликовано: 04 апр. 2007
Источник: redhat
CVSS2: 4.4
EPSS Низкий

Описание

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=235411elinks tries to load .po files from a non-absolute path

EPSS

Процентиль: 46%
0.00233
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 19 лет назад

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

nvd
почти 19 лет назад

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

debian
почти 19 лет назад

Untrusted search path vulnerability in the add_filename_to_string func ...

github
почти 4 года назад

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

oracle-oval
больше 16 лет назад

ELSA-2009-1471: elinks security update (IMPORTANT)

EPSS

Процентиль: 46%
0.00233
Низкий

4.4 Medium

CVSS2