Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5652

Опубликовано: 06 окт. 2015
Источник: ubuntu
Приоритет: low
CVSS2: 7.2

Описание

Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point."

РелизСтатусПримечание
bionic

not-affected

Windows only
cosmic

not-affected

Windows only
devel

not-affected

Windows only
esm-infra-legacy/trusty

not-affected

Windows only
esm-infra/bionic

not-affected

Windows only
esm-infra/xenial

not-affected

Windows only
precise

not-affected

Windows only
precise/esm

not-affected

Windows only
trusty

not-affected

Windows only
trusty/esm

not-affected

Windows only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

Windows only
trusty

DNE

trusty/esm

DNE

upstream

needed

vivid

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

Windows only
precise

DNE

precise/esm

DNE

trusty

not-affected

Windows only
trusty/esm

not-affected

Windows only
upstream

needed

vivid

not-affected

Windows only

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

Windows only
esm-infra/xenial

not-affected

Windows only
precise

DNE

precise/esm

DNE

trusty

not-affected

Windows only
trusty/esm

not-affected

Windows only
upstream

needed

Показывать по

7.2 High

CVSS2

Связанные уязвимости

nvd
почти 10 лет назад

Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point."

github
около 3 лет назад

Untrusted search path vulnerability in python.exe in Python through 3.5.0 on Windows allows local users to gain privileges via a Trojan horse readline.pyd file in the current working directory. NOTE: the vendor says "It was determined that this is a longtime behavior of Python that cannot really be altered at this point."

7.2 High

CVSS2