Vulnerability CVE-2008-2142


Published: 2008-05-12   Modified: 2012-02-12

Description:
Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.

Type:

CWE-Other

Vendor: GNU
Product: Emacs 
Version: 21.3.1;
Product: Xemacs 

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://lists.gnu.org/archive/html/emacs-devel/2008-05/msg00645.html
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
http://security.gentoo.org/glsa/glsa-200902-06.xml
http://thread.gmane.org/gmane.emacs.devel/96903
http://tracker.xemacs.org/XEmacs/its/issue378
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0177
http://www.mandriva.com/security/advisories?name=MDVSA-2008:153
http://www.mandriva.com/security/advisories?name=MDVSA-2008:154
http://www.securityfocus.com/archive/1/492657/100/0/threaded
http://www.securityfocus.com/bid/29176
http://www.securitytracker.com/id?1020019
http://www.vupen.com/english/advisories/2008/1539/references
http://www.vupen.com/english/advisories/2008/1540/references
https://bugs.gentoo.org/show_bug.cgi?id=221197
https://exchange.xforce.ibmcloud.com/vulnerabilities/42362
https://issues.rpath.com/browse/RPL-2529
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00736.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00782.html

Related CVE
CVE-2018-12886
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack ...
CVE-2019-5953
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
CVE-2019-11640
An issue was discovered in GNU recutils 1.8. There is a heap-based buffer overflow in the function rec_fex_parse_str_simple at rec-fex.c in librec.a.
CVE-2019-11639
An issue was discovered in GNU recutils 1.8. There is a stack-based buffer overflow in the function rec_type_check_enum at rec-types.c in librec.a.
CVE-2019-11638
An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_field_name_equal_p at rec-field-name.c in librec.a, leading to a crash.
CVE-2019-11637
An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_rset_get_props at rec-rset.c in librec.a, leading to a crash.
CVE-2006-7254
The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.
CVE-2005-3590
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to ...

Copyright 2019, cxsecurity.com

 

Back to Top