Untrusted search path vulnerability in the Python module in gedit allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
http://secunia.com/advisories/33769 | third party advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:039 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48271 | vdb entry third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01195.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/33445 | vdb entry third party advisory |
http://security.gentoo.org/glsa/glsa-200903-41.xml | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2009/01/26/2 | mailing list |
http://bugzilla.gnome.org/show_bug.cgi?id=569214 | issue tracking patch vendor advisory exploit |
http://secunia.com/advisories/34522 | third party advisory |
http://secunia.com/advisories/33759 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=481556 | issue tracking patch exploit third party advisory |