Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
References
Configurations
History
21 Nov 2024, 00:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251 - | |
References | () http://secunia.com/advisories/33672 - | |
References | () http://secunia.com/advisories/33703 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:040 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:046 - | |
References | () http://www.openwall.com/lists/oss-security/2009/01/26/2 - | |
References | () http://www.securityfocus.com/bid/33448 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=481551 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/48262 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01065.html - |
Information
Published : 2009-01-28 11:30
Updated : 2024-11-21 00:55
NVD link : CVE-2008-5984
Mitre link : CVE-2008-5984
CVE.ORG link : CVE-2008-5984
JSON object : View
Products Affected
dia
- dia
CWE