aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorBoris Samorodov <bsam@FreeBSD.org>2008-11-10 22:50:28 +0000
committerBoris Samorodov <bsam@FreeBSD.org>2008-11-10 22:50:28 +0000
commita995a7306b4e9c3eb46d2b07c0ce114e9631913d (patch)
treeb1654c1cb5c7a0c6c2167aa263846ecc9209dabe /security/vuxml/vuln.xml
parent25a03b6b33affaf0c86536eee3fcfb8e4c23f29d (diff)
downloadports-a995a7306b4e9c3eb46d2b07c0ce114e9631913d.tar.gz
ports-a995a7306b4e9c3eb46d2b07c0ce114e9631913d.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml42
1 files changed, 42 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 818fd6698890..23861ba42458 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,48 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="66657bd5-ac92-11dd-b541-001f3b19d541">
+ <topic>emacs -- run-python vulnerability</topic>
+ <affects>
+ <package>
+ <name>emacs</name>
+ <range><le>22.2_1</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Emacs developers report:</p>
+ <blockquote cite="http://lists.gnu.org/archive/html/emacs-devel/2008-09/msg00215.html">
+ <p>The Emacs command `run-python' launches an interactive
+ Python interpreter. After the Python process starts up,
+ Emacs automatically sends it the line:</p>
+
+ <p>import emacs</p>
+
+ <p>which normally imports a script named emacs.py which is
+ distributed with Emacs. This script, which is typically
+ located in a write-protected installation directory with
+ other Emacs program files, defines various functions to help
+ the Python process communicate with Emacs.</p>
+
+ <p>The vulnerability arises because Python, by default,
+ prepends '' to the module search path, so modules are looked
+ for in the current directory. If the current directory is
+ world-writable, an attacker may insert malicious code by
+ adding a fake Python module named emacs.py into that
+ directory.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://lists.gnu.org/archive/html/emacs-devel/2008-09/msg00215.html</url>
+ </references>
+ <dates>
+ <discovery>2008-09-05</discovery>
+ <entry>2008-11-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="24b64fb0-af1d-11dd-8a16-001b1116b350">
<topic>clamav -- off-by-one heap overflow in VBA project parser</topic>
<affects>