lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155 - | |
References | () http://lists.opensuse.org/opensuse-updates/2012-10/msg00057.html - | |
References | () http://secunia.com/advisories/50157 - Vendor Advisory | |
References | () http://secunia.com/advisories/50801 - | |
References | () http://www.debian.org/security/2013/dsa-2603 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:076 - | |
References | () http://www.openwall.com/lists/oss-security/2012/08/13/1 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2012/08/13/2 - | |
References | () http://www.securityfocus.com/bid/54969 - | |
References | () http://www.securitytracker.com/id?1027375 - | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.420006 - | |
References | () http://www.ubuntu.com/usn/USN-1586-1 - |
Information
Published : 2012-08-25 10:29
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3479
Mitre link : CVE-2012-3479
CVE.ORG link : CVE-2012-3479
JSON object : View
Products Affected
gnu
- emacs
CWE