The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://launchpad.net/bugs/336396 | |
http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog | |
https://gna.org/bugs/index.php?13048 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49058 | vdb entry |
http://www.wesnoth.org/forum/viewtopic.php?t=24340 | patch vendor advisory |
http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog | |
http://www.wesnoth.org/forum/viewtopic.php?t=24247 | patch vendor advisory |
http://secunia.com/advisories/34058 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2009/0595 | vdb entry patch vendor advisory |
http://launchpad.net/bugs/cve/2009-0367 | |
http://secunia.com/advisories/34236 | third party advisory |
http://www.debian.org/security/2009/dsa-1737 | vendor advisory |
http://launchpad.net/bugs/335089 |