Untrusted search path vulnerability in apt-listchanges.py in apt-listchanges before 2.82 allows local users to execute arbitrary code via a malicious apt-listchanges program in the current working directory.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://secunia.com/advisories/28574 | third party advisory |
http://www.ubuntu.com/usn/usn-572-1 | vendor advisory |
http://packages.debian.org/changelogs/pool/main/a/apt-listchanges/apt-listchanges_2.82/changelog | |
http://git.madism.org/?p=apt-listchanges.git%3Ba=commitdiff%3Bh=1bcfbf3dc55413bb83a1782dc9a54515a963fb32 | |
http://secunia.com/advisories/28513 | third party advisory |
http://www.debian.org/security/2008/dsa-1465 | vendor advisory |
http://www.securityfocus.com/bid/27331 | vdb entry |