[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-2027

Date: (C)2007-04-13   (M)2017-10-11
 
CVSS Score: 4.4Access Vector: LOCAL
Exploitability Subscore: 3.4Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

Reference:
BID-23844
SECUNIA-25169
SECUNIA-25198
SECUNIA-25255
SECUNIA-25550
OSVDB-35668
ADV-2007-1686
GLSA-200706-03
USN-457-1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417789
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235411

CWE    1
CWE-134
OVAL    6
oval:org.secpod.oval:def:202730
oval:org.secpod.oval:def:500633
oval:org.secpod.oval:def:202030
oval:org.secpod.oval:def:1500106
...

© 2013 SecPod Technologies