Untrusted search path vulnerability in apt-listchanges.py in apt-listchanges before 2.82 allows local users to execute arbitrary code via a malicious apt-listchanges program in the current working directory.
References
Configurations
History
21 Nov 2024, 00:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.madism.org/?p=apt-listchanges.git%3Ba=commitdiff%3Bh=1bcfbf3dc55413bb83a1782dc9a54515a963fb32 - | |
References | () http://packages.debian.org/changelogs/pool/main/a/apt-listchanges/apt-listchanges_2.82/changelog - | |
References | () http://secunia.com/advisories/28513 - | |
References | () http://secunia.com/advisories/28574 - | |
References | () http://www.debian.org/security/2008/dsa-1465 - | |
References | () http://www.securityfocus.com/bid/27331 - | |
References | () http://www.ubuntu.com/usn/usn-572-1 - |
Information
Published : 2008-01-17 02:00
Updated : 2024-11-21 00:41
NVD link : CVE-2008-0302
Mitre link : CVE-2008-0302
CVE.ORG link : CVE-2008-0302
JSON object : View
Products Affected
debian
- apt-listchanges
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')