CVE-2009-0367

The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wesnoth:wesnoth:1.4:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.5.10:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://launchpad.net/bugs/335089 - () http://launchpad.net/bugs/335089 -
References () http://launchpad.net/bugs/336396 - () http://launchpad.net/bugs/336396 -
References () http://launchpad.net/bugs/cve/2009-0367 - () http://launchpad.net/bugs/cve/2009-0367 -
References () http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog - () http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog -
References () http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog - () http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog -
References () http://secunia.com/advisories/34058 - Vendor Advisory () http://secunia.com/advisories/34058 - Vendor Advisory
References () http://secunia.com/advisories/34236 - () http://secunia.com/advisories/34236 -
References () http://www.debian.org/security/2009/dsa-1737 - () http://www.debian.org/security/2009/dsa-1737 -
References () http://www.vupen.com/english/advisories/2009/0595 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/0595 - Patch, Vendor Advisory
References () http://www.wesnoth.org/forum/viewtopic.php?t=24247 - Patch, Vendor Advisory () http://www.wesnoth.org/forum/viewtopic.php?t=24247 - Patch, Vendor Advisory
References () http://www.wesnoth.org/forum/viewtopic.php?t=24340 - Patch, Vendor Advisory () http://www.wesnoth.org/forum/viewtopic.php?t=24340 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49058 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49058 -
References () https://gna.org/bugs/index.php?13048 - () https://gna.org/bugs/index.php?13048 -

Information

Published : 2009-03-05 02:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0367

Mitre link : CVE-2009-0367

CVE.ORG link : CVE-2009-0367


JSON object : View

Products Affected

wesnoth

  • wesnoth
CWE
CWE-264

Permissions, Privileges, and Access Controls