Vulnerability CVE-2008-4394


Published: 2008-10-10   Modified: 2012-02-12

Description:
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.

Type:

CWE-Other

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Gentoo -> Portage 

 References:
http://xforce.iss.net/xforce/xfdb/45792
http://www.securityfocus.com/bid/31670
http://security.gentoo.org/glsa/glsa-200810-02.xml
http://secunia.com/advisories/32228

Copyright 2024, cxsecurity.com

 

Back to Top