[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108684

 
 

909

 
 

85446

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2007-2027Date: (C)2007-04-13   (M)2018-06-20


Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 4.4
Exploit Score: Exploit Score: 3.4
Impact Score: Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: LOCAL
Attack Complexity: Access Complexity: MEDIUM
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  
Reference:
BID-23844
SECUNIA-25169
SECUNIA-25198
SECUNIA-25255
SECUNIA-25550
OSVDB-35668
ADV-2007-1686
GLSA-200706-03
USN-457-1
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417789
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235411

CWE    1
CWE-134
OVAL    6
oval:org.secpod.oval:def:1500106
oval:org.secpod.oval:def:201979
oval:org.secpod.oval:def:202030
oval:org.secpod.oval:def:202730
...

© SecPod Technologies