| ID |
CVE-2008-4394
|
| Sažetak |
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds. |
| Reference |
|
| CVSS |
| Base: | 6.9 |
| Impact: | 10.0 |
| Exploitability: | 3.4 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
MEDIUM |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:L/AC:M/Au:N/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
08-08-2017 - 01:32 |
| Objavljeno |
10-10-2008 - 10:30 |