diff options
author | Martin Wilke <miwi@FreeBSD.org> | 2008-11-13 20:43:57 +0000 |
---|---|---|
committer | Martin Wilke <miwi@FreeBSD.org> | 2008-11-13 20:43:57 +0000 |
commit | f6e1886141ac2bdad9ebdd9770158a306982c6a5 (patch) | |
tree | 906c31ccfeda162b94ecab66f05ff30b018adb43 | |
parent | 094b5e9f14a51c74fe494b785535cd1224e72318 (diff) | |
download | ports-f6e1886141ac2bdad9ebdd9770158a306982c6a5.tar.gz ports-f6e1886141ac2bdad9ebdd9770158a306982c6a5.zip |
Notes
-rw-r--r-- | security/vuxml/vuln.xml | 43 |
1 files changed, 22 insertions, 21 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b383ad104768..19e69d3d796c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -150,10 +150,13 @@ Note: Please add new entries to the beginning of this file. </description> <references> <cvename>CVE-2008-4201</cvename> + <url>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499899</url> + <url>http://www.gentoo.org/security/en/glsa/glsa-200811-03.xml</url> </references> <dates> <discovery>2008-09-16</discovery> <entry>2008-11-12</entry> + <modified>2008-11-13</modified> </dates> </vuln> @@ -172,21 +175,18 @@ Note: Please add new entries to the beginning of this file. <p>The Emacs command `run-python' launches an interactive Python interpreter. After the Python process starts up, Emacs automatically sends it the line:</p> - - <p>import emacs</p> - - <p>which normally imports a script named emacs.py which is - distributed with Emacs. This script, which is typically - located in a write-protected installation directory with - other Emacs program files, defines various functions to help - the Python process communicate with Emacs.</p> - - <p>The vulnerability arises because Python, by default, - prepends '' to the module search path, so modules are looked - for in the current directory. If the current directory is - world-writable, an attacker may insert malicious code by - adding a fake Python module named emacs.py into that - directory.</p> + <p>import emacs</p> + <p>which normally imports a script named emacs.py which is + distributed with Emacs. This script, which is typically + located in a write-protected installation directory with + other Emacs program files, defines various functions to help + the Python process communicate with Emacs.</p> + <p>The vulnerability arises because Python, by default, + prepends '' to the module search path, so modules are looked + for in the current directory. If the current directory is + world-writable, an attacker may insert malicious code by + adding a fake Python module named emacs.py into that + directory.</p> </blockquote> </body> </description> @@ -216,17 +216,17 @@ Note: Please add new entries to the beginning of this file. <p>Advisory from Moritz Jodeit, November 8th, 2008:</p> <blockquote cite="http://www.securityfocus.com/archive/1/498169/30/0/threaded"> <p>ClamAV contains an off-by-one heap overflow vulnerability - in the code responsible for parsing VBA project files. - Successful exploitation could allow an attacker to execute - arbitrary code with the privileges of the `clamd' process by - sending an email with a prepared attachment.</p> + in the code responsible for parsing VBA project files. + Successful exploitation could allow an attacker to execute + arbitrary code with the privileges of the `clamd' process by + sending an email with a prepared attachment.</p> <p>A VBA project file embedded inside an OLE2 office document - send as an attachment can trigger the off-by-one.</p> + send as an attachment can trigger the off-by-one.</p> </blockquote> <p>Entry from Thu Oct 30 13:52:42 CET 2008 (acab) in ChangeLog:</p> <blockquote cite="http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog"> <p>libclamav/vba_extract.c: get_unicode_name off-by-one, - bb#1239 reported by Moritz Jodeit >moritz*jodeit.org<</p> + bb#1239 reported by Moritz Jodeit >moritz*jodeit.org<</p> </blockquote> </body> </description> @@ -239,6 +239,7 @@ Note: Please add new entries to the beginning of this file. <entry>2008-11-10</entry> </dates> </vuln> + <vuln vid="c89a3ebb-ae07-11dd-b4b2-001f3c8eabeb"> <topic>trac -- potential DOS vulnerability</topic> <affects> |